✕ Clear filters
1,636 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,430📚 Coursera 16,184
Tony Turner: Securing the Cyber Supply Chain
Cybersecurity
Tony Turner: Securing the Cyber Supply Chain
SANS Institute Intermediate 3y ago
The Internet just changed.
Cybersecurity
The Internet just changed.
David Bombal Intermediate 3y ago
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
Cybersecurity
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
SANS Institute Intermediate 3y ago
Reverse Engineering - Computerphile
Cybersecurity
Reverse Engineering - Computerphile
Computerphile Intermediate 3y ago
He Took Control of 50,000 Printers With 3 Lines of Code🎙Darknet Diaries Ep. 31: Hacker Giraffe
Cybersecurity
He Took Control of 50,000 Printers With 3 Lines of Code🎙Darknet Diaries Ep. 31: Hacker Giraffe
Jack Rhysider Intermediate 3y ago
3 ways the web can be INSECURE👩‍💻 #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Cybersecurity
3 ways the web can be INSECURE👩‍💻 #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Coding with Lewis Intermediate 3y ago
Put your hacking skills to the test with Capture The Flag competition #Shorts
Cybersecurity
Put your hacking skills to the test with Capture The Flag competition #Shorts
Google for Developers Intermediate 3y ago
How to Prioritize Your Work: Effort Impact Scale
Cybersecurity
How to Prioritize Your Work: Effort Impact Scale
AJ&Smart Intermediate 3y ago
Activating ACM Private Certificate Authority - AWS Virtual Workshop
Cybersecurity
Activating ACM Private Certificate Authority - AWS Virtual Workshop
AWS Developers Intermediate 3y ago
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
Cybersecurity
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
John Hammond Intermediate 3y ago
Why an Innocent Man Confessed to Medical Extortion Hacking🎙Darknet Diaries Ep. 25: Alberto
Cybersecurity
Why an Innocent Man Confessed to Medical Extortion Hacking🎙Darknet Diaries Ep. 25: Alberto
Jack Rhysider Intermediate 3y ago
HackTheBox - Fingerprint
Cybersecurity
HackTheBox - Fingerprint
IppSec Intermediate 3y ago
I published an Internet app, wait—how do I protect it? - AWS Online Tech Talks
Cybersecurity
I published an Internet app, wait—how do I protect it? - AWS Online Tech Talks
AWS Developers Intermediate 3y ago
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
Cybersecurity
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
HackerSploit Intermediate 4y ago
16 secs to break it! 😱 70% of real world WiFi networks owned!
Cybersecurity
16 secs to break it! 😱 70% of real world WiFi networks owned!
David Bombal Intermediate 4y ago
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022
Cybersecurity
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022
LiveOverflow Intermediate 4y ago
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
Cybersecurity
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
HackerSploit Intermediate 4y ago
This lets you create complex applications on the web👩‍💻 #technology #programming #webdev #software
Cybersecurity
This lets you create complex applications on the web👩‍💻 #technology #programming #webdev #software
Coding with Lewis Intermediate 4y ago
What happens if you hack 4.5 billion BTC? // The Code Report
Cybersecurity
What happens if you hack 4.5 billion BTC? // The Code Report
Fireship Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck (2) Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck Intermediate 4y ago
James Rowley: Creating and Running an Insider Threat Program
Cybersecurity
James Rowley: Creating and Running an Insider Threat Program
SANS Institute Intermediate 3y ago
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
Cybersecurity
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
SANS Institute Intermediate 3y ago
The Real STEM Sadie: Owning Your Story
Cybersecurity
The Real STEM Sadie: Owning Your Story
SANS Institute Intermediate 3y ago
Recruiting, Training, and Retaining Neurodivergent Talent
Cybersecurity
Recruiting, Training, and Retaining Neurodivergent Talent
SANS Institute Intermediate 3y ago
New Shell in Town: Adventures in using PowerShell on Linux
Cybersecurity
New Shell in Town: Adventures in using PowerShell on Linux
SANS Institute Intermediate 3y ago
Risky Business: Careers in GRC
Cybersecurity
Risky Business: Careers in GRC
SANS Institute Intermediate 3y ago
Taking the Plunge:  Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel
Cybersecurity
Taking the Plunge: Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel
SANS Institute Intermediate 3y ago
New2Cyber Catch-22: Getting Experience When You Have No Experience
Cybersecurity
New2Cyber Catch-22: Getting Experience When You Have No Experience
SANS Institute Intermediate 3y ago
Why SecDevOps is the New Way in Cybersecurity
Cybersecurity
Why SecDevOps is the New Way in Cybersecurity
SANS Institute Intermediate 3y ago
Promoted from CISO to CIO
Cybersecurity
Promoted from CISO to CIO
SANS Institute Intermediate 3y ago
Amp Up Your Career:  Careers in Energy and Critical Infrastructure Cybersecurity
Cybersecurity
Amp Up Your Career: Careers in Energy and Critical Infrastructure Cybersecurity
SANS Institute Intermediate 3y ago
Hacking Your Mind: Como começar e continuar a evoluir
Cybersecurity
Hacking Your Mind: Como começar e continuar a evoluir
SANS Institute Intermediate 3y ago
AT&T Charged Him $900 So He Took Down Their Network | Darknet Diaries Ep. 20: mobman
Cybersecurity
AT&T Charged Him $900 So He Took Down Their Network | Darknet Diaries Ep. 20: mobman
Jack Rhysider Intermediate 3y ago
Hiring and Mentoring in 2022 | Seat at the Table
Cybersecurity
Hiring and Mentoring in 2022 | Seat at the Table
SANS Institute Intermediate 4y ago
Cloud Wars; Episode I - The IAM Menace
Cybersecurity
Cloud Wars; Episode I - The IAM Menace
SANS Institute Intermediate 4y ago
Join us for the Free SANS New2Cyber Summit 2022!
Cybersecurity
Join us for the Free SANS New2Cyber Summit 2022!
SANS Institute Intermediate 4y ago
Black Girls Hack Too
Cybersecurity
Black Girls Hack Too
SANS Institute Intermediate 4y ago
Linux Defense Evasion - Apache2 Rootkit
Cybersecurity
Linux Defense Evasion - Apache2 Rootkit
HackerSploit Intermediate 4y ago
How To Crack ZIP & RAR Files With Hashcat
Cybersecurity
How To Crack ZIP & RAR Files With Hashcat
HackerSploit Intermediate 4y ago
Web App Pentesting - Setting Up OWASP bWAPP With Docker
Cybersecurity
Web App Pentesting - Setting Up OWASP bWAPP With Docker
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure GUI Apps
Cybersecurity
Windows Privilege Escalation - Exploiting Insecure GUI Apps
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Scheduled Tasks
Cybersecurity
Windows Privilege Escalation - Exploiting Scheduled Tasks
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
Cybersecurity
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
HackerSploit Intermediate 4y ago
HEK.SI 2022 - Bypassing UAC With UACMe
Cybersecurity
HEK.SI 2022 - Bypassing UAC With UACMe
HackerSploit Intermediate 4y ago
SOC 2 TSCs
Cybersecurity
SOC 2 TSCs
SANS Institute Intermediate 4y ago
EternalBlue - MS17-010 - Manual Exploitation
Cybersecurity
EternalBlue - MS17-010 - Manual Exploitation
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Cybersecurity
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
HackerSploit Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Implementing Basic BGP
📚 Coursera Course ↗
Self-paced
Implementing Basic BGP
Opens on Coursera ↗
IP Addressing and Core Protocols
📚 Coursera Course ↗
Self-paced
IP Addressing and Core Protocols
Opens on Coursera ↗
Advanced Network Services, Security, and Programmability
📚 Coursera Course ↗
Self-paced
Advanced Network Services, Security, and Programmability
Opens on Coursera ↗
Introduction to Cybersecurity Essentials
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Essentials
Opens on Coursera ↗
TLS & HTTPS Explained – Visualizations & Localhost Setup
📚 Coursera Course ↗
Self-paced
TLS & HTTPS Explained – Visualizations & Localhost Setup
Opens on Coursera ↗
Cisco CyberOps Associate (200-201)
📚 Coursera Course ↗
Self-paced
Cisco CyberOps Associate (200-201)
Opens on Coursera ↗