✕ Clear filters
1,639 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,516📚 Coursera 16,212
Journey Through 2000 Years of Yin-Yang Harmonisation (Tiao He)
Cybersecurity
Journey Through 2000 Years of Yin-Yang Harmonisation (Tiao He)
TCM Academy Intermediate 5y ago
Pete Bryan - Scaling Jupyter Notebooks for global scale security analysis | JupyterCon 2020
Cybersecurity
Pete Bryan - Scaling Jupyter Notebooks for global scale security analysis | JupyterCon 2020
JupyterCon Intermediate 5y ago
You Got a Job in Cybersecurity!... Now What?! (Panel)
Cybersecurity
You Got a Job in Cybersecurity!... Now What?! (Panel)
SANS Institute Intermediate 5y ago
#BuildYourBrand: Blogging & Podcasting Your Way to Leadership (Panel)
Cybersecurity
#BuildYourBrand: Blogging & Podcasting Your Way to Leadership (Panel)
SANS Institute Intermediate 5y ago
Linux Security - UFW Complete Guide (Uncomplicated Firewall)
Cybersecurity
Linux Security - UFW Complete Guide (Uncomplicated Firewall)
HackerSploit Intermediate 5y ago
Linux Security - Securing Nginx
Cybersecurity
Linux Security - Securing Nginx
HackerSploit Intermediate 5y ago
Audio Spectrogram & StegCracker Passwords - DownUnderCTF
Cybersecurity
Audio Spectrogram & StegCracker Passwords - DownUnderCTF
John Hammond Intermediate 5y ago
Pwntools ROP Binary Exploitation - DownUnderCTF
Cybersecurity
Pwntools ROP Binary Exploitation - DownUnderCTF
John Hammond Intermediate 5y ago
Why is HTTPS Important: Creating a Simple Flask Server
Cybersecurity
Why is HTTPS Important: Creating a Simple Flask Server
Real Python Intermediate 5y ago
When to use UDP vs TCP in Building a Backend Application?
Cybersecurity
When to use UDP vs TCP in Building a Backend Application?
Hussein Nasser Intermediate 5y ago
Doordash moves their Backend to Apache Kafka from RabbitMQ, VERY interesting! Let us discuss it!
Cybersecurity
Doordash moves their Backend to Apache Kafka from RabbitMQ, VERY interesting! Let us discuss it!
Hussein Nasser Intermediate 5y ago
HackTheBox - Quick
Cybersecurity
HackTheBox - Quick
IppSec Intermediate 5y ago
Customer lifetime value in a discrete-time contractual setting (math and Python implementation)
Cybersecurity
Customer lifetime value in a discrete-time contractual setting (math and Python implementation)
Sophia Yang Intermediate 5y ago
HackTheBox - Fatty
Cybersecurity
HackTheBox - Fatty
IppSec Intermediate 5y ago
Public Speaking: Feel the Fear and Do it Anyway | Xena Olsen
Cybersecurity
Public Speaking: Feel the Fear and Do it Anyway | Xena Olsen
SANS Institute Intermediate 5y ago
Linux Security - Securing Apache2
Cybersecurity
Linux Security - Securing Apache2
HackerSploit Intermediate 5y ago
Linux Security - Configuring SUDO Access
Cybersecurity
Linux Security - Configuring SUDO Access
HackerSploit Intermediate 5y ago
Instagram & Twitter OSINT - DownUnderCTF
Cybersecurity
Instagram & Twitter OSINT - DownUnderCTF
John Hammond Intermediate 5y ago
TryHackMe - Basic Pentesting Walkthrough
Cybersecurity
TryHackMe - Basic Pentesting Walkthrough
HackerSploit Intermediate 5y ago
How To Fix Metasploit V5 "Exploit Failed: An Exploitation Error Occurred"
Cybersecurity
How To Fix Metasploit V5 "Exploit Failed: An Exploitation Error Occurred"
HackerSploit Intermediate 5y ago
Hosting BsidesBOS CTF - SEPTEMBER 26
Cybersecurity
Hosting BsidesBOS CTF - SEPTEMBER 26
John Hammond Intermediate 5y ago
How to Build a Global, Digital Security Awareness Scavenger Hunt | Neaka Balloge
Cybersecurity
How to Build a Global, Digital Security Awareness Scavenger Hunt | Neaka Balloge
SANS Institute Intermediate 5y ago
Kioptrix 2014 Walkthrough - Boot-To-Root
Cybersecurity
Kioptrix 2014 Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Wiresharking Secure Shell (SSH) - Spoiler alert 🚨 : its chatty
Cybersecurity
Wiresharking Secure Shell (SSH) - Spoiler alert 🚨 : its chatty
Hussein Nasser Intermediate 5y ago
TryHackMe GAMING SERVER - LXD Privilege Escalation
Cybersecurity
TryHackMe GAMING SERVER - LXD Privilege Escalation
John Hammond Intermediate 5y ago
Cloudflare fixes a HUGE limitation in HTTP/2 upload implementation in  NGINX - Let us discuss
Cybersecurity
Cloudflare fixes a HUGE limitation in HTTP/2 upload implementation in NGINX - Let us discuss
Hussein Nasser Intermediate 5y ago
A SameSite Cookie Exception was made to avoid Redirect Loop in Single Sign-On (SSO) Let us Discuss
Cybersecurity
A SameSite Cookie Exception was made to avoid Redirect Loop in Single Sign-On (SSO) Let us Discuss
Hussein Nasser Intermediate 5y ago
HackTheBox Walkthrough - Cronos
Cybersecurity
HackTheBox Walkthrough - Cronos
HackerSploit Intermediate 5y ago
They Web Scraped 235 MILLION YouTube, Instagram and TikTok Accounts and Left their Database Exposed
Cybersecurity
They Web Scraped 235 MILLION YouTube, Instagram and TikTok Accounts and Left their Database Exposed
Hussein Nasser Intermediate 5y ago
Greenbone Community Edition - Virtual Appliance Setup & Configuration
Cybersecurity
Greenbone Community Edition - Virtual Appliance Setup & Configuration
HackerSploit Intermediate 5y ago
Vulnerability Scanning With Nmap
Cybersecurity
Vulnerability Scanning With Nmap
HackerSploit Intermediate 5y ago
Using History API to Animate URL and hmm what else?
Cybersecurity
Using History API to Animate URL and hmm what else?
Hussein Nasser Intermediate 5y ago
Nmap - MySQL Enumeration
Cybersecurity
Nmap - MySQL Enumeration
HackerSploit Intermediate 5y ago
Nmap - SMB Enumeration
Cybersecurity
Nmap - SMB Enumeration
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - WAF Detection And Fingerprinting
Cybersecurity
Nmap - HTTP Enumeration - WAF Detection And Fingerprinting
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - Finding Hidden Files And Directories
Cybersecurity
Nmap - HTTP Enumeration - Finding Hidden Files And Directories
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - Detecting HTTP Methods
Cybersecurity
Nmap - HTTP Enumeration - Detecting HTTP Methods
HackerSploit Intermediate 5y ago
Nmap - SMTP Enumeration
Cybersecurity
Nmap - SMTP Enumeration
HackerSploit Intermediate 5y ago
Nmap - DNS Enumeration
Cybersecurity
Nmap - DNS Enumeration
HackerSploit Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Nmap - FTP Enumeration
Cybersecurity
Nmap - FTP Enumeration
HackerSploit Intermediate 5y ago
Nmap - Banner Grabbing
Cybersecurity
Nmap - Banner Grabbing
HackerSploit Intermediate 5y ago
Nmap - NSE Syntax
Cybersecurity
Nmap - NSE Syntax
HackerSploit Intermediate 5y ago
A Machine Learning Primer for the Blue Team
Cybersecurity
A Machine Learning Primer for the Blue Team
SANS Institute Intermediate 5y ago
Your Backend is Also a Frontend (Backend vs Frontend Engineering)
Cybersecurity
Your Backend is Also a Frontend (Backend vs Frontend Engineering)
Hussein Nasser Intermediate 5y ago
HackTheBox - Oouch
Cybersecurity
HackTheBox - Oouch
IppSec Intermediate 5y ago
Nmap - Scan Timing And Performance
Cybersecurity
Nmap - Scan Timing And Performance
HackerSploit Intermediate 5y ago
MongoDB and ElasticSearch Clusters WIPED! The Meow attack and how Backend Engineers can prevent it
Cybersecurity
MongoDB and ElasticSearch Clusters WIPED! The Meow attack and how Backend Engineers can prevent it
Hussein Nasser Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
System & Network Security Essentials
📚 Coursera Course ↗
Self-paced
System & Network Security Essentials
Opens on Coursera ↗
Advanced Networking Services and Routing
📚 Coursera Course ↗
Self-paced
Advanced Networking Services and Routing
Opens on Coursera ↗
Execution, persistence, privilege escalation and evasion
📚 Coursera Course ↗
Self-paced
Execution, persistence, privilege escalation and evasion
Opens on Coursera ↗
Incident Management and Continuous Improvement
📚 Coursera Course ↗
Self-paced
Incident Management and Continuous Improvement
Opens on Coursera ↗
Cloud Next Generation Firewall: avaliação de requisitos
📚 Coursera Course ↗
Self-paced
Cloud Next Generation Firewall: avaliação de requisitos
Opens on Coursera ↗
Introduction à Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introduction à Cloud Next Generation Firewall
Opens on Coursera ↗