✕ Clear filters
1,639 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,537📚 Coursera 16,240
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
Cybersecurity
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
David Bombal Intermediate 4y ago
Fuzzing & Directory Brute-Force With ffuf
Cybersecurity
Fuzzing & Directory Brute-Force With ffuf
HackerSploit Intermediate 4y ago
Identifying & Countering Cognitive Bias
Cybersecurity
Identifying & Countering Cognitive Bias
SANS Institute Intermediate 4y ago
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
Cybersecurity
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
UHC - Jarmis
Cybersecurity
UHC - Jarmis
IppSec Intermediate 4y ago
HackTheBox Mirai - Raspberry Pi Pentesting
Cybersecurity
HackTheBox Mirai - Raspberry Pi Pentesting
HackerSploit Intermediate 4y ago
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
Cybersecurity
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
VOD - TryHackMe! Attacking Kerberos
Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
Cybersecurity
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
SANS Institute Intermediate 4y ago
Thumbnail A/B Test Experiment for CTR
Cybersecurity
Thumbnail A/B Test Experiment for CTR
LiveUnderflow Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
Cybersecurity
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
Better than Stack Overflow for Development
Cybersecurity
Better than Stack Overflow for Development
LiveUnderflow Intermediate 4y ago
"Controversial Security" // BSides Berlin 2021
Cybersecurity
"Controversial Security" // BSides Berlin 2021
LiveOverflow Intermediate 4y ago
Hacking Out of a Network - Computerphile
Cybersecurity
Hacking Out of a Network - Computerphile
Computerphile Intermediate 4y ago
using z3 to reverse a custom hash during a CTF be like #shorts
Cybersecurity
using z3 to reverse a custom hash during a CTF be like #shorts
LiveOverflow Intermediate 4y ago
Build 5 Projects With HTML, CSS & JavaScript
Cybersecurity
Build 5 Projects With HTML, CSS & JavaScript
Traversy Media Intermediate 4y ago
Insane $100,000 home lab!
Cybersecurity
Insane $100,000 home lab!
David Bombal Intermediate 4y ago
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?😰😰😰😰😰
Cybersecurity
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?😰😰😰😰😰
Krish Naik Intermediate 4y ago
Redis in 100 Seconds
Cybersecurity
Redis in 100 Seconds
Fireship Intermediate 4y ago
HackTheBox - ScriptKiddie
Cybersecurity
HackTheBox - ScriptKiddie
IppSec Intermediate 4y ago
Data Visualization: Bridging the Gap Between Users and Information
Cybersecurity
Data Visualization: Bridging the Gap Between Users and Information
Microsoft Research Intermediate 4y ago
HackTheBox Nibbles - Exploiting Arbitrary File Upload
Cybersecurity
HackTheBox Nibbles - Exploiting Arbitrary File Upload
HackerSploit Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
Cybersecurity
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
HackerSploit Intermediate 4y ago
Post Exploitation - Transferring Files To Windows Targets
Cybersecurity
Post Exploitation - Transferring Files To Windows Targets
HackerSploit Intermediate 4y ago
How To Setup Your Terminal For Penetration Testing
Cybersecurity
How To Setup Your Terminal For Penetration Testing
HackerSploit Intermediate 4y ago
AWS Systems Manager Incident Manager - AWS Virtual Workshops
Cybersecurity
AWS Systems Manager Incident Manager - AWS Virtual Workshops
AWS Developers Intermediate 4y ago
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
Cybersecurity
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
LiveUnderflow Intermediate 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
Cybersecurity
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Cybertalk - EP10 - Interview With GhostSec
Cybersecurity
Cybertalk - EP10 - Interview With GhostSec
HackerSploit Intermediate 4y ago
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
Cybersecurity
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
HackerSploit Intermediate 4y ago
HackTheBox "Business CTF" - Time - Command Injection
Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
Cybersecurity
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
Securing The Docker Daemon
Cybersecurity
Securing The Docker Daemon
HackerSploit Intermediate 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
HackTheBox Beep Walkthrough - LFI Exploitation
Cybersecurity
HackTheBox Beep Walkthrough - LFI Exploitation
HackerSploit Intermediate 4y ago
Studying Cybersecurity in USA vs. Germany | ReHacked
Cybersecurity
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow Intermediate 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
TryHackMe - Vulnversity Walkthrough
Cybersecurity
TryHackMe - Vulnversity Walkthrough
HackerSploit Intermediate 4y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
The 1% rule
Cybersecurity
The 1% rule
David Bombal Intermediate 4y ago
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
Cybersecurity
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Systems and Cybersecurity Fundamentals Part 1
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 1
Opens on Coursera ↗
Network Operations
📚 Coursera Course ↗
Self-paced
Network Operations
Opens on Coursera ↗
Cybersecurity: What to Do When You Are a Victim
📚 Coursera Course ↗
Self-paced
Cybersecurity: What to Do When You Are a Victim
Opens on Coursera ↗
Nmap for Penetration Testing: From Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Nmap for Penetration Testing: From Beginner to Advanced
Opens on Coursera ↗
Effective .NET Memory Management
📚 Coursera Course ↗
Self-paced
Effective .NET Memory Management
Opens on Coursera ↗
Advanced Networking, Security, and IT Operations
📚 Coursera Course ↗
Self-paced
Advanced Networking, Security, and IT Operations
Opens on Coursera ↗