✕ Clear filters
1,639 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,547📚 Coursera 16,244
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
Cybersecurity
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
John Hammond Intermediate 6y ago
Cybertalk Clips | How To Improve Your CTF Skills
Cybersecurity
Cybertalk Clips | How To Improve Your CTF Skills
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
Cybersecurity
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
HackerSploit Intermediate 6y ago
Do you REALLY need a VPN?
Cybersecurity
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
HackTheBox - Safe
Cybersecurity
HackTheBox - Safe
IppSec Intermediate 6y ago
HackTheBox - Ellingson
Cybersecurity
HackTheBox - Ellingson
IppSec Intermediate 6y ago
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
Cybersecurity
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
John Hammond Intermediate 6y ago
How The Cult of The Dead Cow Helped Shape Modern Cybersecurity | Joseph Menn | Talks at Google
Cybersecurity
How The Cult of The Dead Cow Helped Shape Modern Cybersecurity | Joseph Menn | Talks at Google
Talks at Google Intermediate 6y ago
10x Engineer: What? You can do this on Cisco IOS?
Cybersecurity
10x Engineer: What? You can do this on Cisco IOS?
David Bombal Intermediate 6y ago
GNS3: Docker containers vs Virtual Machines
Cybersecurity
GNS3: Docker containers vs Virtual Machines
David Bombal Intermediate 6y ago
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
Cybersecurity
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor Intermediate 6y ago
How Speedrunners Use Game Hacking Tools
Cybersecurity
How Speedrunners Use Game Hacking Tools
LiveOverflow Intermediate 6y ago
The TOP 3 uses for a Raspberry Pi!!
Cybersecurity
The TOP 3 uses for a Raspberry Pi!!
NetworkChuck Intermediate 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Cybersecurity
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Computerphile Intermediate 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
How public WIFI can be sniffed?
Cybersecurity
How public WIFI can be sniffed?
Hussein Nasser Intermediate 6y ago
Chatting about Cryptography and Exploit Regulations
Cybersecurity
Chatting about Cryptography and Exploit Regulations
LiveUnderflow Intermediate 6y ago
Hacking Skills Perspective
Cybersecurity
Hacking Skills Perspective
LiveUnderflow Intermediate 6y ago
Linux Essentials For Hackers - #7 - Finding Files With Locate
Cybersecurity
Linux Essentials For Hackers - #7 - Finding Files With Locate
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #6 - grep & piping
Cybersecurity
Linux Essentials For Hackers - #6 - grep & piping
HackerSploit Intermediate 6y ago
Cybertalk - EP2 -  CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
Cybersecurity
Cybertalk - EP2 - CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
HackerSploit Intermediate 6y ago
Cybertalk Clips | Importance Of Secure Coding For Developers
Cybersecurity
Cybertalk Clips | Importance Of Secure Coding For Developers
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #5 - File & Directory Ownership
Cybersecurity
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
Cybersecurity
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #3 - File Management & Manipulation
Cybersecurity
Linux Essentials For Hackers - #3 - File Management & Manipulation
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
Cybersecurity
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
HackerSploit Intermediate 6y ago
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
Cybersecurity
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
Cybertalk - EP1 -  Secure Coding, HackTheBox & Web App Penetration Testing
Cybersecurity
Cybertalk - EP1 - Secure Coding, HackTheBox & Web App Penetration Testing
HackerSploit Intermediate 6y ago
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
Cybersecurity
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
HackerSploit Intermediate 6y ago
OSCP - Taking Notes & Resources
Cybersecurity
OSCP - Taking Notes & Resources
John Hammond Intermediate 6y ago
Python3 For Pentesting - Developing A Banner Grabbing Script
Cybersecurity
Python3 For Pentesting - Developing A Banner Grabbing Script
HackerSploit Intermediate 6y ago
How To Upgrade Linux Kernel On Ubuntu
Cybersecurity
How To Upgrade Linux Kernel On Ubuntu
HackerSploit Intermediate 6y ago
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
Cybersecurity
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
John Hammond Intermediate 6y ago
100% OSCP: Offensive Security Certified Professional
Cybersecurity
100% OSCP: Offensive Security Certified Professional
John Hammond Intermediate 6y ago
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
Cybersecurity
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
Cybersecurity
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
Kioptrix 1.1 Walkthrough - Boot-To-Root
Cybersecurity
Kioptrix 1.1 Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
HACKERS REACT: Bad Hollywood Hacking Scenes
Cybersecurity
HACKERS REACT: Bad Hollywood Hacking Scenes
John Hammond Intermediate 6y ago
How To Install VMware Tools On BlackArch Linux
Cybersecurity
How To Install VMware Tools On BlackArch Linux
HackerSploit Intermediate 6y ago
How To Install Desktop Environments And Change Screen Resolution With xrandr
Cybersecurity
How To Install Desktop Environments And Change Screen Resolution With xrandr
HackerSploit Intermediate 6y ago
How To Install BlackArch Linux
Cybersecurity
How To Install BlackArch Linux
HackerSploit Intermediate 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
How To Setup A Virtualization Server With Proxmox
Cybersecurity
How To Setup A Virtualization Server With Proxmox
HackerSploit Intermediate 6y ago
MITRE CTF 2019 HIGHLIGHTS
Cybersecurity
MITRE CTF 2019 HIGHLIGHTS
John Hammond Intermediate 6y ago
Pivoting And Persistence With Armitage
Cybersecurity
Pivoting And Persistence With Armitage
HackerSploit Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Cybersecurity
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Security Architecture
📚 Coursera Course ↗
Self-paced
Advanced Security Architecture
Opens on Coursera ↗
Security and Auditing in Ethereum
📚 Coursera Course ↗
Self-paced
Security and Auditing in Ethereum
Opens on Coursera ↗
Getting Started in Port Scanning Using Nmap and Kali Linux
📚 Coursera Course ↗
Self-paced
Getting Started in Port Scanning Using Nmap and Kali Linux
Opens on Coursera ↗
Cybersecurity Solutions and Microsoft Defender
📚 Coursera Course ↗
Self-paced
Cybersecurity Solutions and Microsoft Defender
Opens on Coursera ↗
Discrete Math for Computer Science - Algorithms & Recursion
📚 Coursera Course ↗
Self-paced
Discrete Math for Computer Science - Algorithms & Recursion
Opens on Coursera ↗
Into the Trenches: Security Operations Center
📚 Coursera Course ↗
Self-paced
Into the Trenches: Security Operations Center
Opens on Coursera ↗