✕ Clear filters
5,278 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 185,686📚 Coursera 16,665
HackTheBox - TwoMillion
Cybersecurity
HackTheBox - TwoMillion
IppSec Beginner 2y ago
Hacking 101
Cybersecurity
Hacking 101
GeeksforGeeks Beginner 2y ago
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Cybersecurity
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Lex Fridman Beginner 2y ago
Next Level API Hacking with Kiterunner
Cybersecurity ⚡ AI Lesson
Next Level API Hacking with Kiterunner
The Cyber Mentor Beginner 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity ⚡ AI Lesson
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity ⚡ AI Lesson
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
HackTheBox - Bagel
Cybersecurity ⚡ AI Lesson
HackTheBox - Bagel
IppSec Beginner 2y ago
Practical Junior Penetration Tester (PJPT) - Certification Overview
Cybersecurity ⚡ AI Lesson
Practical Junior Penetration Tester (PJPT) - Certification Overview
The Cyber Mentor Beginner 2y ago
Windows Pentest Tutorial (Active Directory Game Over!)
Cybersecurity ⚡ AI Lesson
Windows Pentest Tutorial (Active Directory Game Over!)
David Bombal Beginner 2y ago
Authentication Bypass Using Root Array
Cybersecurity
Authentication Bypass Using Root Array
LiveOverflow Beginner 2y ago
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
Cybersecurity ⚡ AI Lesson
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
SANS Institute Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
AI Voice Scams are on the RISE!
Cybersecurity
AI Voice Scams are on the RISE!
1littlecoder Intermediate 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
Cybersecurity ⚡ AI Lesson
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
Catch me if you can! #shorts
Cybersecurity
Catch me if you can! #shorts
David Bombal Beginner 2y ago
What is the BEST Hacking Platform?
Cybersecurity ⚡ AI Lesson
What is the BEST Hacking Platform?
The Cyber Mentor Beginner 2y ago
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity ⚡ AI Lesson
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
HackTheBox - Absolute
Cybersecurity
HackTheBox - Absolute
IppSec Beginner 2y ago
Building a Password Cracker in Rust
Cybersecurity ⚡ AI Lesson
Building a Password Cracker in Rust
The Cyber Mentor Beginner 2y ago
It's DNS again 😢 Did you know this Malware Hack?
Cybersecurity ⚡ AI Lesson
It's DNS again 😢 Did you know this Malware Hack?
David Bombal Beginner 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity ⚡ AI Lesson
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
Kali NetHunter Pro in 6 minutes
Cybersecurity
Kali NetHunter Pro in 6 minutes
David Bombal Beginner 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
Cybersecurity ⚡ AI Lesson
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity ⚡ AI Lesson
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
This New Web Hacking Tool May Replace Burp Suite
Cybersecurity ⚡ AI Lesson
This New Web Hacking Tool May Replace Burp Suite
The Cyber Mentor Beginner 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity ⚡ AI Lesson
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
His new gadget any good at catching rogue devices?
Cybersecurity
His new gadget any good at catching rogue devices?
David Bombal Beginner 2y ago
HackTheBox - Precious
Cybersecurity ⚡ AI Lesson
HackTheBox - Precious
IppSec Beginner 2y ago
the BEST resources for finding a cybersecurity job
Cybersecurity ⚡ AI Lesson
the BEST resources for finding a cybersecurity job
The Cyber Mentor Beginner 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity ⚡ AI Lesson
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 2y ago
The BEST Notetaking Apps Ranked
Cybersecurity ⚡ AI Lesson
The BEST Notetaking Apps Ranked
The Cyber Mentor Beginner 2y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity ⚡ AI Lesson
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 2y ago
How to be Invisible Online (and the hard truth about it)...
Cybersecurity
How to be Invisible Online (and the hard truth about it)...
David Bombal Beginner 2y ago
Are you getting ready for Summer? So are hackers! #passwordchange  #ethicalhacking #cybersecurity
Cybersecurity ⚡ AI Lesson
Are you getting ready for Summer? So are hackers! #passwordchange #ethicalhacking #cybersecurity
The Cyber Mentor Intermediate 2y ago
FIVE Practical AI Uses for Cybersecurity
Cybersecurity ⚡ AI Lesson
FIVE Practical AI Uses for Cybersecurity
The Cyber Mentor Beginner 2y ago
L2CODE like a hacker #programming #python #rust #cybersecurity
Cybersecurity ⚡ AI Lesson
L2CODE like a hacker #programming #python #rust #cybersecurity
The Cyber Mentor Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity ⚡ AI Lesson
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Dangerous Code in Seconds: Eval the evil #webapp  #infosec  #cybersecurity  #ethicalhacking
Cybersecurity ⚡ AI Lesson
Dangerous Code in Seconds: Eval the evil #webapp #infosec #cybersecurity #ethicalhacking
The Cyber Mentor Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
Cybersecurity ⚡ AI Lesson
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
SANS Institute Intermediate 2y ago
SANS Cybersecurity Leadership Summit 2023
Cybersecurity ⚡ AI Lesson
SANS Cybersecurity Leadership Summit 2023
SANS Institute Beginner 2y ago
NICE Career: Discovering Career Pathways
Cybersecurity ⚡ AI Lesson
NICE Career: Discovering Career Pathways
SANS Institute Intermediate 2y ago
Role-Play Your Way Into Cyber: Hands-On with KC7
Cybersecurity ⚡ AI Lesson
Role-Play Your Way Into Cyber: Hands-On with KC7
SANS Institute Beginner 2y ago
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
Cybersecurity ⚡ AI Lesson
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
SANS Institute Intermediate 2y ago
Going the Distance: Lessons from The Last Mile Education Fund
Cybersecurity ⚡ AI Lesson
Going the Distance: Lessons from The Last Mile Education Fund
SANS Institute Intermediate 2y ago
From Nothing to Something: Getting Experience When You Have No Experience
Cybersecurity ⚡ AI Lesson
From Nothing to Something: Getting Experience When You Have No Experience
SANS Institute Beginner 2y ago
Clickjacking - Hacking Web Application UIs
Cybersecurity ⚡ AI Lesson
Clickjacking - Hacking Web Application UIs
The Cyber Mentor Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
Opens on Coursera ↗
Red Hat Enterprise Linux 8
📚 Coursera Course ↗
Self-paced
Red Hat Enterprise Linux 8
Opens on Coursera ↗
Mastering the Art of Cross-Functional Collaboration
📚 Coursera Course ↗
Self-paced
Mastering the Art of Cross-Functional Collaboration
Opens on Coursera ↗
Designing Software-Defined Branch Infrastructures
📚 Coursera Course ↗
Self-paced
Designing Software-Defined Branch Infrastructures
Opens on Coursera ↗
Cloud Security, Resiliency, and Vulnerability Management
📚 Coursera Course ↗
Self-paced
Cloud Security, Resiliency, and Vulnerability Management
Opens on Coursera ↗
Introduction to reCAPTCHA
📚 Coursera Course ↗
Self-paced
Introduction to reCAPTCHA
Opens on Coursera ↗