✕ Clear filters
1,622 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,214📚 Coursera 16,067
Louvre's Password Was WHAT?
Cybersecurity
Louvre's Password Was WHAT?
David Bombal Intermediate 5mo ago
Think Before You Click: Phishing Red Flags
Cybersecurity
Think Before You Click: Phishing Red Flags
SANS Institute Intermediate 5mo ago
Cybersecurity goes CRAZY 🤯
Cybersecurity
Cybersecurity goes CRAZY 🤯
Sajjaad Khader Intermediate 5mo ago
Cybersecurity Mythbusters – Volume 1
Cybersecurity
Cybersecurity Mythbusters – Volume 1
SANS Institute Intermediate 5mo ago
UK Digital ID Breached Already?
Cybersecurity
UK Digital ID Breached Already?
David Bombal Intermediate 5mo ago
"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya
Cybersecurity
"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya
Darknet Diaries Intermediate 5mo ago
SHOCKING Truth: How Lord Rama Saved Me from Christian Faith
Cybersecurity
SHOCKING Truth: How Lord Rama Saved Me from Christian Faith
ExcelGuru Intermediate 5mo ago
How Superhuman is Handling AI and User Data
Cybersecurity
How Superhuman is Handling AI and User Data
The Information Intermediate 5mo ago
How To Create a Resume: Step-by-Step Guide
Cybersecurity
How To Create a Resume: Step-by-Step Guide
GeeksforGeeks Intermediate 5mo ago
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
Cybersecurity
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
John Hammond Intermediate 5mo ago
Hackers Bruteforce Passwords to Microsoft Online
Cybersecurity
Hackers Bruteforce Passwords to Microsoft Online
John Hammond Intermediate 5mo ago
"The Flow" Featuring Stytch: Security in the AI Landscape
Cybersecurity
"The Flow" Featuring Stytch: Security in the AI Landscape
Langflow Intermediate 6mo ago
Access control for IoT Devices - Cyber Security Course 2025
Cybersecurity
Access control for IoT Devices - Cyber Security Course 2025
MasterMind Academy Intermediate 6mo ago
Emerging Trends in Network Security - Cyber Security Course 2025
Cybersecurity
Emerging Trends in Network Security - Cyber Security Course 2025
MasterMind Academy Intermediate 6mo ago
LIVE: Alex's last stream?! | Web Hacking | Cybersecurity | Pentesting
Cybersecurity
LIVE: Alex's last stream?! | Web Hacking | Cybersecurity | Pentesting
The Cyber Mentor Intermediate 6mo ago
Oversharing Online Makes You a Scam Target
Cybersecurity
Oversharing Online Makes You a Scam Target
Coursera Intermediate 6mo ago
Your Apps Are Watching You (Here's How to Stop Them)
Cybersecurity
Your Apps Are Watching You (Here's How to Stop Them)
Coursera Intermediate 6mo ago
C++ Application Architecture - A Mini-Series
Cybersecurity
C++ Application Architecture - A Mini-Series
The Cherno Intermediate 6mo ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | AMA
Cybersecurity
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | AMA
The Cyber Mentor Intermediate 7mo ago
Identity Security Foundations for AI Products - AI PM Community Session #84
Cybersecurity
Identity Security Foundations for AI Products - AI PM Community Session #84
PM Exercises Intermediate 7mo ago
Trepang 2: How We Saved The Helicopter Boss Fight!
Cybersecurity
Trepang 2: How We Saved The Helicopter Boss Fight!
AI and Games Intermediate 7mo ago
Why does Wireshark exist?
Cybersecurity
Why does Wireshark exist?
David Bombal Intermediate 5mo ago
What a VPN Actually Does
Cybersecurity
What a VPN Actually Does
David Bombal Intermediate 5mo ago
Stop Breaches NOW: Free UK Cyber Toolkit Anyone Can Use
Cybersecurity
Stop Breaches NOW: Free UK Cyber Toolkit Anyone Can Use
David Bombal Intermediate 5mo ago
UK vs 4chan: WARNING for 2025
Cybersecurity
UK vs 4chan: WARNING for 2025
David Bombal Intermediate 6mo ago
Warning: WiFi Camera (CCTV) vs Raspberry Pi Zero
Cybersecurity
Warning: WiFi Camera (CCTV) vs Raspberry Pi Zero
David Bombal Intermediate 6mo ago
They’re collecting your data to decrypt later?
Cybersecurity
They’re collecting your data to decrypt later?
David Bombal Intermediate 6mo ago
The EU wants to read all your messages (and your photos and videos)
Cybersecurity
The EU wants to read all your messages (and your photos and videos)
David Bombal Intermediate 6mo ago
Raspberry Pi 5 + Kali: No Wi-Fi Dongle Needed
Cybersecurity
Raspberry Pi 5 + Kali: No Wi-Fi Dongle Needed
David Bombal Intermediate 6mo ago
Kali on Raspberry Pi 5 can now HACK WiFi (No adapter needed)
Cybersecurity
Kali on Raspberry Pi 5 can now HACK WiFi (No adapter needed)
David Bombal Intermediate 6mo ago
Entire country blocked because of age verification. Happening more and more
Cybersecurity
Entire country blocked because of age verification. Happening more and more
David Bombal Intermediate 6mo ago
AI slop FLOODS platforms - Spotify fights spam
Cybersecurity
AI slop FLOODS platforms - Spotify fights spam
David Bombal Intermediate 6mo ago
new capture the flag (hacking competition)
Cybersecurity
new capture the flag (hacking competition)
John Hammond Intermediate 6mo ago
Risk of Network Attacks - Cyber Security Course 2025
Cybersecurity
Risk of Network Attacks - Cyber Security Course 2025
MasterMind Academy Intermediate 6mo ago
Patch NOW: Cisco Firewall Zero Day!
Cybersecurity
Patch NOW: Cisco Firewall Zero Day!
David Bombal Intermediate 6mo ago
USB "Update" = Backdoor
Cybersecurity
USB "Update" = Backdoor
David Bombal Intermediate 6mo ago
Kali 2025.3: Pi 5 Monitor Mode
Cybersecurity
Kali 2025.3: Pi 5 Monitor Mode
David Bombal Intermediate 6mo ago
ICS613: ICS/OT Penetration Testing & Assessments
Cybersecurity
ICS613: ICS/OT Penetration Testing & Assessments
SANS Institute Intermediate 6mo ago
ICS456: Essentials for NERC Critical Infrastructure Protection
Cybersecurity
ICS456: Essentials for NERC Critical Infrastructure Protection
SANS Institute Intermediate 6mo ago
Warning: Are Cloud Backups Even Safe?
Cybersecurity
Warning: Are Cloud Backups Even Safe?
David Bombal Intermediate 6mo ago
Backing Up Files = You Have a Disaster Recovery Plan
Cybersecurity
Backing Up Files = You Have a Disaster Recovery Plan
Coursera Intermediate 6mo ago
SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience
Cybersecurity
SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience
SANS Institute Intermediate 6mo ago
EU Politicians EXEMPT. You’re Not
Cybersecurity
EU Politicians EXEMPT. You’re Not
David Bombal Intermediate 6mo ago
Is Vibe Coding the future? Or is it Vibe Hacking?
Cybersecurity
Is Vibe Coding the future? Or is it Vibe Hacking?
David Bombal Intermediate 7mo ago
Superstores Are Scanning Your Face - The SCARY Part
Cybersecurity
Superstores Are Scanning Your Face - The SCARY Part
David Bombal Intermediate 7mo ago
Is Spotify doxxing you now?
Cybersecurity
Is Spotify doxxing you now?
David Bombal Intermediate 7mo ago
Governments are hacking firewalls and ...
Cybersecurity
Governments are hacking firewalls and ...
David Bombal Intermediate 7mo ago
How One Prompt Hijacked Lenovo’s AI Chatbot
Cybersecurity
How One Prompt Hijacked Lenovo’s AI Chatbot
David Bombal Intermediate 7mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Linux Security Basics and Beyond: Unit 4
📚 Coursera Course ↗
Self-paced
Linux Security Basics and Beyond: Unit 4
Opens on Coursera ↗
Understanding the Healthcare Innovation Process I
📚 Coursera Course ↗
Self-paced
Understanding the Healthcare Innovation Process I
Opens on Coursera ↗
CCNA: Network Security, Automation, and Troubleshooting
📚 Coursera Course ↗
Self-paced
CCNA: Network Security, Automation, and Troubleshooting
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Defend
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera ↗
Learn Man in the Middle Attacks from Scratch
📚 Coursera Course ↗
Self-paced
Learn Man in the Middle Attacks from Scratch
Opens on Coursera ↗
Network Defense Strategies
📚 Coursera Course ↗
Self-paced
Network Defense Strategies
Opens on Coursera ↗