✕ Clear filters
5,254 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,710📚 Coursera 16,327
Amazon Cybersecurity HACKER Q&A 🤫
Cybersecurity
Amazon Cybersecurity HACKER Q&A 🤫
Sajjaad Khader Intermediate 12mo ago
HackTheBox - Administrator
Cybersecurity
HackTheBox - Administrator
IppSec Beginner 12mo ago
RevOps: "OR... I can set up Zapier to scan the contents..."
Cybersecurity
RevOps: "OR... I can set up Zapier to scan the contents..."
Zapier Intermediate 12mo ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 12mo ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 12mo ago
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Cybersecurity
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Evan Carmichael Intermediate 12mo ago
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 1y ago
4chan penetrated by a gang of soyjaks…
Cybersecurity
4chan penetrated by a gang of soyjaks…
Fireship Beginner 1y ago
Real-Time cyber threats
Cybersecurity
Real-Time cyber threats
Weights & Biases Intermediate 1y ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 1y ago
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
Cybersecurity
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
David Bombal Intermediate 1y ago
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 1y ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 1y ago
A Day in the Life of a Network Security Engineer
Cybersecurity
A Day in the Life of a Network Security Engineer
SANS Institute Advanced 1y ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 1y ago
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Cybersecurity
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Zapier Intermediate 1y ago
HackTheBox - LinkVortex
Cybersecurity
HackTheBox - LinkVortex
IppSec Beginner 1y ago
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
Cybersecurity
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
edureka! Beginner 1y ago
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Cybersecurity
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Arivi by HCL GUVI Beginner 1y ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 1y ago
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
Cybersecurity
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
LiveOverflow Beginner 1y ago
We bought stolen election access before the hackers did
Cybersecurity
We bought stolen election access before the hackers did
Weights & Biases Intermediate 1y ago
The hunt for America's most wanted computer scientist...
Cybersecurity
The hunt for America's most wanted computer scientist...
Fireship Beginner 1y ago
CZ Enhances Healthcare Innovation with the Databricks Data Intelligence Platform
Cybersecurity
CZ Enhances Healthcare Innovation with the Databricks Data Intelligence Platform
Databricks Beginner 1y ago
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 1y ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 1y ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 1y ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 1y ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 1y ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 1y ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 1y ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 1y ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 1y ago
How AI Dating Scams Are Getting Dangerously Smart in 2025
Cybersecurity
How AI Dating Scams Are Getting Dangerously Smart in 2025
The Cyber Mentor Beginner 1y ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 1y ago
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 1y ago
Watch Out for this AI Prompt Injection Hack!
Cybersecurity
Watch Out for this AI Prompt Injection Hack!
The Cyber Mentor Beginner 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
Learn Cybersecurity Defense!
Cybersecurity
Learn Cybersecurity Defense!
John Hammond Beginner 1y ago
How to Avoid These Cybersecurity Resume Mistakes
Cybersecurity
How to Avoid These Cybersecurity Resume Mistakes
The Cyber Mentor Beginner 1y ago
Turn Your Hard-Earned Experience into Impact
Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 1y ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 1y ago
How I Landed My First Cybersecurity Job
Cybersecurity
How I Landed My First Cybersecurity Job
The Cyber Mentor Beginner 1y ago
Security Operations (SOC) 101 Course - 10+ Hours of Content!
Cybersecurity
Security Operations (SOC) 101 Course - 10+ Hours of Content!
The Cyber Mentor Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
The Business of Cybersecurity Capstone
📚 Coursera Course ↗
Self-paced
The Business of Cybersecurity Capstone
Opens on Coursera ↗
Secure GKE with Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Secure GKE with Cloud Next Generation Firewall
Opens on Coursera ↗
Cybersecurity Awareness and Innovation
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness and Innovation
Opens on Coursera ↗
IoT Security: Interface and Data Security
📚 Coursera Course ↗
Self-paced
IoT Security: Interface and Data Security
Opens on Coursera ↗
Advanced Penetration Techniques
📚 Coursera Course ↗
Self-paced
Advanced Penetration Techniques
Opens on Coursera ↗
CISSP Domain 6: Security Assessment and Testing
📚 Coursera Course ↗
Self-paced
CISSP Domain 6: Security Assessment and Testing
Opens on Coursera ↗