✕ Clear filters
1,623 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,301📚 Coursera 16,118
How a Nigerian man stole millions of dollars in tax refunds
Cybersecurity
How a Nigerian man stole millions of dollars in tax refunds
Jack Rhysider Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
Cybersecurity
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
SANS Institute Intermediate 2y ago
ESG and Sustainable Financial Strategy Course
Cybersecurity
ESG and Sustainable Financial Strategy Course
Saïd Business School, University of Oxford Intermediate 2y ago
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
Cybersecurity
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
MLOps.community Intermediate 2y ago
What Can You Gain with Cybersecurity Certificates?
Cybersecurity
What Can You Gain with Cybersecurity Certificates?
Coursera Intermediate 2y ago
Three Cloud Security Differentiators for Leaders
Cybersecurity
Three Cloud Security Differentiators for Leaders
SANS Institute Intermediate 2y ago
How Amat Cama hacked Samsung for 3 years straight
Cybersecurity
How Amat Cama hacked Samsung for 3 years straight
Jack Rhysider Intermediate 2y ago
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
Cybersecurity
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
David Bombal Intermediate 2y ago
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
CS50 Cybersecurity - Lecture 3 - Securing Software
Cybersecurity
CS50 Cybersecurity - Lecture 3 - Securing Software
CS50 Intermediate 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
Cybersecurity Roadmap 2023 ! #cybersecurity
Cybersecurity
Cybersecurity Roadmap 2023 ! #cybersecurity
Shweta Intermediate 2y ago
AI for Good Specialization: Learn AI's role in addressing real-world challenges
Cybersecurity
AI for Good Specialization: Learn AI's role in addressing real-world challenges
DeepLearningAI Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
Cybersecurity
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
SANS Institute Intermediate 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
Cybersecurity
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
SANS Institute Intermediate 2y ago
The Russian cyberattack that crippled Ukraine
Cybersecurity
The Russian cyberattack that crippled Ukraine
Jack Rhysider Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
Did the World Bank’s servers get breached?
Cybersecurity
Did the World Bank’s servers get breached?
Jack Rhysider Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
Cybersecurity
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
SANS Institute Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
How these hackers won a Tesla using a web browser
Cybersecurity
How these hackers won a Tesla using a web browser
Jack Rhysider Intermediate 2y ago
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
Cybersecurity
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
SANS Institute Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
Cybersecurity
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
David Bombal Intermediate 2y ago
The Penetration Test That Went Horribly Wrong🎙Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Cybersecurity
The Penetration Test That Went Horribly Wrong🎙Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Jack Rhysider Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Your Windows Passwords 😱 #shorts #windows
Cybersecurity
Your Windows Passwords 😱 #shorts #windows
David Bombal Intermediate 2y ago
How "Mimikatz" works
Cybersecurity
How "Mimikatz" works
Jack Rhysider Intermediate 2y ago
This scammer milked Facebook for millions
Cybersecurity
This scammer milked Facebook for millions
Jack Rhysider Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
OneCoin exposed as the biggest crypto scam!
Cybersecurity
OneCoin exposed as the biggest crypto scam!
Jack Rhysider Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Burp Suite Unfiltered - Go from a Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Burp Suite Unfiltered - Go from a Beginner to Advanced
Opens on Coursera ↗
Governance and Strategy
📚 Coursera Course ↗
Self-paced
Governance and Strategy
Opens on Coursera ↗
Model Context Protocol (MCP) Mastery
📚 Coursera Course ↗
Self-paced
Model Context Protocol (MCP) Mastery
Opens on Coursera ↗
IT Infrastructure and Emerging Trends
📚 Coursera Course ↗
Self-paced
IT Infrastructure and Emerging Trends
Opens on Coursera ↗
Fundamentals of Integrated Brand Promotion
📚 Coursera Course ↗
Self-paced
Fundamentals of Integrated Brand Promotion
Opens on Coursera ↗
Unveiling the NIST Risk Management Framework (RMF)
📚 Coursera Course ↗
Self-paced
Unveiling the NIST Risk Management Framework (RMF)
Opens on Coursera ↗