✕ Clear filters
1,639 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,516📚 Coursera 16,212
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
Cybersecurity
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
HackerSploit Intermediate 5y ago
Wiresharking Server-Sent Events
Cybersecurity
Wiresharking Server-Sent Events
Hussein Nasser Intermediate 5y ago
NetworkChuck Coffee
Cybersecurity
NetworkChuck Coffee
NetworkChuck Intermediate 5y ago
Remote Code Execution bug found in Popular Node.js changelog library (I go through the code)
Cybersecurity
Remote Code Execution bug found in Popular Node.js changelog library (I go through the code)
Hussein Nasser Intermediate 5y ago
VLC Kill Bill: Easter Egg Reverse Engineering
Cybersecurity
VLC Kill Bill: Easter Egg Reverse Engineering
LiveOverflow Intermediate 5y ago
Introduction To Pentesting - Enumeration
Cybersecurity
Introduction To Pentesting - Enumeration
HackerSploit Intermediate 5y ago
Capture the Flag? Change Your Life
Cybersecurity
Capture the Flag? Change Your Life
John Hammond Intermediate 5y ago
Understanding and Applying Threat Intelligence
Cybersecurity
Understanding and Applying Threat Intelligence
SANS Institute Intermediate 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
what am i doing?? (aws...security+.....ccna?)
Cybersecurity
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
HackTheBox - Resolute
Cybersecurity
HackTheBox - Resolute
IppSec Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
David Bombal Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
David Bombal Intermediate 5y ago
Running CTFs with Docker (VirSecCon CTF Recap)
Cybersecurity
Running CTFs with Docker (VirSecCon CTF Recap)
John Hammond Intermediate 5y ago
Why MissingNo Multiplies Items!
Cybersecurity
Why MissingNo Multiplies Items!
LiveOverflow Intermediate 5y ago
My Thoughts on the Massive VPN Leak of 1.2 TB User logs
Cybersecurity
My Thoughts on the Massive VPN Leak of 1.2 TB User logs
Hussein Nasser Intermediate 5y ago
Digicert revokes 50,000 EV Certificates
Cybersecurity
Digicert revokes 50,000 EV Certificates
Hussein Nasser Intermediate 5y ago
The Cloudflare Outage - What Happened? And my Thoughts
Cybersecurity
The Cloudflare Outage - What Happened? And my Thoughts
Hussein Nasser Intermediate 5y ago
My Thoughts on The Twitter “Hack”
Cybersecurity
My Thoughts on The Twitter “Hack”
Hussein Nasser Intermediate 5y ago
How To Reset Linux Root Password
Cybersecurity
How To Reset Linux Root Password
HackerSploit Intermediate 5y ago
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Cybersecurity
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Hussein Nasser Intermediate 5y ago
Building a Deno HTTPS Web Server with Self-Signed Certificate
Cybersecurity
Building a Deno HTTPS Web Server with Self-Signed Certificate
Hussein Nasser Intermediate 5y ago
How To Convert Linux Packages With Alien
Cybersecurity
How To Convert Linux Packages With Alien
HackerSploit Intermediate 5y ago
How much can you learn about the Backend from its API?
Cybersecurity
How much can you learn about the Backend from its API?
Hussein Nasser Intermediate 5y ago
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Cybersecurity
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Hussein Nasser Intermediate 5y ago
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Cybersecurity
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Hussein Nasser Intermediate 5y ago
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Cybersecurity
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Hussein Nasser Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
Cybersecurity
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
HackTheBox Walkthrough - Tenten
Cybersecurity
HackTheBox Walkthrough - Tenten
HackerSploit Intermediate 5y ago
HackTheBox Walkthrough - Optimum
Cybersecurity
HackTheBox Walkthrough - Optimum
HackerSploit Intermediate 5y ago
Shock to the System: Re-Evaluating Your Security Operations
Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Cybertalk - EP6 - Don't Dual Boot
Cybersecurity
Cybertalk - EP6 - Don't Dual Boot
HackerSploit Intermediate 5y ago
Nmap - Firewall Detection (ACK Probing)
Cybersecurity
Nmap - Firewall Detection (ACK Probing)
HackerSploit Intermediate 5y ago
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
Cybersecurity
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
HackerSploit Intermediate 5y ago
Nmap - Output And Verbosity
Cybersecurity
Nmap - Output And Verbosity
HackerSploit Intermediate 5y ago
Nmap - UDP Scanning
Cybersecurity
Nmap - UDP Scanning
HackerSploit Intermediate 5y ago
Nmap - TCP Connect & Stealth (SYN) Scanning
Cybersecurity
Nmap - TCP Connect & Stealth (SYN) Scanning
HackerSploit Intermediate 5y ago
Nmap - OS And Service Version Scanning
Cybersecurity
Nmap - OS And Service Version Scanning
HackerSploit Intermediate 5y ago
Nmap - Host Discovery With Ping Sweep
Cybersecurity
Nmap - Host Discovery With Ping Sweep
HackerSploit Intermediate 5y ago
Network Scanning - TCP Flags & TCP 3-Way Handshake
Cybersecurity
Network Scanning - TCP Flags & TCP 3-Way Handshake
HackerSploit Intermediate 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
David Bombal Intermediate 5y ago
TryHackMe! Buffer Overflow & Penetration Testing
Cybersecurity
TryHackMe! Buffer Overflow & Penetration Testing
John Hammond Intermediate 5y ago
TryHackMe! Wget for Privilege Escalation
Cybersecurity
TryHackMe! Wget for Privilege Escalation
John Hammond Intermediate 5y ago
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
Cybersecurity
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
SANS Institute Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Vulnerability Scanning with Nmap: Network Scanning
📚 Coursera Course ↗
Self-paced
Vulnerability Scanning with Nmap: Network Scanning
Opens on Coursera ↗
Cybersecurity Fundamentals for High-Tech Manufacturing
📚 Coursera Course ↗
Self-paced
Cybersecurity Fundamentals for High-Tech Manufacturing
Opens on Coursera ↗
Cybersecurity Awareness
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness
Opens on Coursera ↗
Advanced Python - Reconnaissance
📚 Coursera Course ↗
Self-paced
Advanced Python - Reconnaissance
Opens on Coursera ↗
Metasploit para Principiantes: Básicos de explotación
📚 Coursera Course ↗
Self-paced
Metasploit para Principiantes: Básicos de explotación
Opens on Coursera ↗
Practical Pentesting
📚 Coursera Course ↗
Self-paced
Practical Pentesting
Opens on Coursera ↗