✕ Clear filters
1,639 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,537📚 Coursera 16,238
Information Gathering With Shodan
Cybersecurity
Information Gathering With Shodan
HackerSploit Intermediate 6y ago
Defeating Attackers with Preventative Security
Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Wireshark: Packet Analysis and Ethical Hacking Course
Cybersecurity
Wireshark: Packet Analysis and Ethical Hacking Course
David Bombal Intermediate 6y ago
HSCTF - RSA Cryptography (Reverse Search Algorithm)
Cybersecurity
HSCTF - RSA Cryptography (Reverse Search Algorithm)
John Hammond Intermediate 6y ago
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Cybersecurity
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANS Institute Intermediate 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
LiveUnderflow Intermediate 6y ago
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
Cybersecurity
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
John Hammond Intermediate 6y ago
How To Setup A Sandbox Environment For Malware Analysis
Cybersecurity
How To Setup A Sandbox Environment For Malware Analysis
HackerSploit Intermediate 6y ago
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
Cybersecurity
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
LiveOverflow Intermediate 6y ago
HackTheBox - LightWeight
Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 6y ago
HackTheBox - Bighead
Cybersecurity
HackTheBox - Bighead
IppSec Intermediate 6y ago
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
Cybersecurity
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
David Bombal Intermediate 6y ago
KALI LINUX! - CS50 Live, EP. 51
Cybersecurity
KALI LINUX! - CS50 Live, EP. 51
CS50 Intermediate 7y ago
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Cybersecurity
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
SANS Institute Intermediate 6y ago
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Cybersecurity
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute Intermediate 6y ago
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
Cybersecurity
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
SANS Institute Intermediate 6y ago
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
Cybersecurity
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
John Hammond Intermediate 6y ago
Crypto: Classic RSA with a Twist (ParsonsCTF)
Cybersecurity
Crypto: Classic RSA with a Twist (ParsonsCTF)
John Hammond Intermediate 6y ago
Linux Essentials: Curl Fundamentals
Cybersecurity
Linux Essentials: Curl Fundamentals
HackerSploit Intermediate 6y ago
Facebook CTF - SQL Injection with Spaces (Products Manager)
Cybersecurity
Facebook CTF - SQL Injection with Spaces (Products Manager)
John Hammond Intermediate 6y ago
Post Exploitation With Empire And LaZagne
Cybersecurity
Post Exploitation With Empire And LaZagne
HackerSploit Intermediate 6y ago
bWAPP - Server-Side Include (SSI) Injection
Cybersecurity
bWAPP - Server-Side Include (SSI) Injection
HackerSploit Intermediate 6y ago
bWAPP - OS Command Injection With Commix (All levels)
Cybersecurity
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Stored (Blog)
Cybersecurity
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Reflected POST
Cybersecurity
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 6y ago
CrunchBangPlusPlus - #!++ - Installation & Review
Cybersecurity
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 6y ago
Bug Bounty Hunting - PHP Code Injection
Cybersecurity
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 6y ago
Heartbleed Exploit - Discovery & Exploitation
Cybersecurity
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 6y ago
How To Backup Linux Systems With Grsync
Cybersecurity
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 6y ago
Bug Bounty Hunting - iframe Injection & HTML Injection
Cybersecurity
Bug Bounty Hunting - iframe Injection & HTML Injection
HackerSploit Intermediate 6y ago
How To Setup VSCode In The Cloud - code-server
Cybersecurity
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 6y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 7y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 7y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
Cybersecurity
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 7y ago
SunshineCTF 2019: WelcomeCrypto [ROT47]
Cybersecurity
SunshineCTF 2019: WelcomeCrypto [ROT47]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Loopback [PCAP Forensics]
Cybersecurity
b00t2root19 CTF: Loopback [PCAP Forensics]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Treasure [GameBoy ROMs]
Cybersecurity
b00t2root19 CTF: Treasure [GameBoy ROMs]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
Cybersecurity
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
John Hammond Intermediate 7y ago
CommandoVM Installation - Windows-based Penetration Testing Distribution
Cybersecurity
CommandoVM Installation - Windows-based Penetration Testing Distribution
HackerSploit Intermediate 7y ago
b00t2root19 CTF: Genetics [DNA Cryptography]
Cybersecurity
b00t2root19 CTF: Genetics [DNA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
Cybersecurity
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
John Hammond Intermediate 7y ago
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
Cybersecurity
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
Cybersecurity
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
Cybersecurity
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
John Hammond Intermediate 7y ago
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
Cybersecurity
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
David Bombal Intermediate 7y ago
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
Cybersecurity
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
John Hammond Intermediate 7y ago
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
Cybersecurity
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
HackerSploit Intermediate 7y ago
How To Manually Sign APK's with Jarsigner & Zipalign
Cybersecurity
How To Manually Sign APK's with Jarsigner & Zipalign
HackerSploit Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Traffic Analysis for Incident Response
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera ↗
Ethical Hacking Foundations
📚 Coursera Course ↗
Self-paced
Ethical Hacking Foundations
Opens on Coursera ↗
GCP Security and Networking
📚 Coursera Course ↗
Self-paced
GCP Security and Networking
Opens on Coursera ↗
The Absolute Beginners Guide to Cyber Security - Part 4
📚 Coursera Course ↗
Self-paced
The Absolute Beginners Guide to Cyber Security - Part 4
Opens on Coursera ↗
 Vulnerability Assessment and Management
📚 Coursera Course ↗
Self-paced
Vulnerability Assessment and Management
Opens on Coursera ↗
Web Application Security Testing with OWASP ZAP
📚 Coursera Course ↗
Self-paced
Web Application Security Testing with OWASP ZAP
Opens on Coursera ↗