✕ Clear filters
1,641 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,629📚 Coursera 16,303
Homemade CTF Challenge: 05 "The Assumption Song"
Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 9y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 9y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
Brain Scanner - Computerphile
Cybersecurity
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
How to Read Your Textbooks More Efficiently - College Info Geek
Cybersecurity
How to Read Your Textbooks More Efficiently - College Info Geek
Thomas Frank Intermediate 11y ago
Do You Actually Need to Read Your Textbooks? - College Info Geek
Cybersecurity
Do You Actually Need to Read Your Textbooks? - College Info Geek
Thomas Frank Intermediate 11y ago
Behind the Great Firewall of China - Michael Anti
Cybersecurity
Behind the Great Firewall of China - Michael Anti
TED-Ed Intermediate 12y ago
Homemade CTF Challenge: 03 "Web Hunt"
Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
Inside a Data Centre - Computerphile
Cybersecurity
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 10y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
CS50 2014 - Week 10
Cybersecurity
CS50 2014 - Week 10
CS50 Intermediate 11y ago
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Cybersecurity
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Thomas Frank Intermediate 11y ago
Python [pygame] 12 Platforming Rectangular Collision Resolution
Cybersecurity
Python [pygame] 12 Platforming Rectangular Collision Resolution
John Hammond Intermediate 12y ago
Python [pygame] 11 Rectangular Collision Detection
Cybersecurity
Python [pygame] 11 Rectangular Collision Detection
John Hammond Intermediate 12y ago
Cross Site Request Forgery - Computerphile
Cybersecurity
Cross Site Request Forgery - Computerphile
Computerphile Intermediate 12y ago
Hacking Websites with SQL Injection - Computerphile
Cybersecurity
Hacking Websites with SQL Injection - Computerphile
Computerphile Intermediate 12y ago
Virtual Machines Power the Cloud - Computerphile
Cybersecurity
Virtual Machines Power the Cloud - Computerphile
Computerphile Intermediate 12y ago
Python 00 Installing IDLE on Linux
Cybersecurity
Python 00 Installing IDLE on Linux
John Hammond Intermediate 13y ago
Python [hashlib] 02 Algorithms
Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Seguridad informática: defensa contra las artes oscuras digitales
📚 Coursera Course ↗
Self-paced
Seguridad informática: defensa contra las artes oscuras digitales
Opens on Coursera ↗
An Introduction to Cryptography
📚 Coursera Course ↗
Self-paced
An Introduction to Cryptography
Opens on Coursera ↗
Check Point Jump Start: Maestro Hyperscale Network Security
📚 Coursera Course ↗
Self-paced
Check Point Jump Start: Maestro Hyperscale Network Security
Opens on Coursera ↗
Negotiation  Fundamentals
📚 Coursera Course ↗
Self-paced
Negotiation Fundamentals
Opens on Coursera ↗
Proactive Computer Security
📚 Coursera Course ↗
Self-paced
Proactive Computer Security
Opens on Coursera ↗
Offensive Cyber Operations
📚 Coursera Course ↗
Self-paced
Offensive Cyber Operations
Opens on Coursera ↗