✕ Clear filters
5,279 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 185,738📚 Coursera 16,690
Stealing Hashes with SeriousSam (CVE-2021–36934)
Cybersecurity ⚡ AI Lesson
Stealing Hashes with SeriousSam (CVE-2021–36934)
The Cyber Mentor Beginner 4y ago
Securing The Docker Daemon
Cybersecurity ⚡ AI Lesson
Securing The Docker Daemon
HackerSploit Intermediate 4y ago
Why Being a Destructive Architect is the Way Forward for Black in Tech
Cybersecurity ⚡ AI Lesson
Why Being a Destructive Architect is the Way Forward for Black in Tech
SANS Institute Beginner 4y ago
Reading SECRET U.S. Air Force HACKING Document!!
Cybersecurity ⚡ AI Lesson
Reading SECRET U.S. Air Force HACKING Document!!
LiveUnderflow Advanced 4y ago
Auditing Docker Security
Cybersecurity ⚡ AI Lesson
Auditing Docker Security
HackerSploit Beginner 4y ago
Insane $100,000 home lab!
Cybersecurity
Insane $100,000 home lab!
David Bombal Intermediate 4y ago
HackTheBox - Breadcrumbs
Cybersecurity ⚡ AI Lesson
HackTheBox - Breadcrumbs
IppSec Beginner 4y ago
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
Cybersecurity ⚡ AI Lesson
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
SANS Institute Advanced 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Cybersecurity
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Lex Fridman Beginner 4y ago
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?😰😰😰😰😰
Cybersecurity
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?😰😰😰😰😰
Krish Naik Intermediate 4y ago
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
Cybersecurity ⚡ AI Lesson
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
NetworkChuck Beginner 4y ago
You must fight! Lessons from Kaseya hack
Cybersecurity
You must fight! Lessons from Kaseya hack
David Bombal Beginner 4y ago
Redis in 100 Seconds
Cybersecurity ⚡ AI Lesson
Redis in 100 Seconds
Fireship Intermediate 4y ago
CISSP Certification Course – PASS the Certified Information Security Professional Exam!
Cybersecurity
CISSP Certification Course – PASS the Certified Information Security Professional Exam!
freeCodeCamp.org Beginner 4y ago
Machine Learning in Cybersecurity // Monika Venčkauskaitė // MLOps Meetup #70
Cybersecurity
Machine Learning in Cybersecurity // Monika Venčkauskaitė // MLOps Meetup #70
MLOps.community Beginner 4y ago
HackTheBox - Ophiuchi
Cybersecurity ⚡ AI Lesson
HackTheBox - Ophiuchi
IppSec Beginner 4y ago
Studying Cybersecurity in USA vs. Germany | ReHacked
Cybersecurity
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow Intermediate 4y ago
Dealing with Burnout
Cybersecurity ⚡ AI Lesson
Dealing with Burnout
The Cyber Mentor Beginner 4y ago
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Cybersecurity
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Lex Fridman Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Data Visualization: Bridging the Gap Between Users and Information
Cybersecurity
Data Visualization: Bridging the Gap Between Users and Information
Microsoft Research Intermediate 4y ago
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Cybersecurity
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Neil Patel Beginner 4y ago
Own a WiFi network with Python! WiFi DoS and ownership attack 😀 😂
Cybersecurity
Own a WiFi network with Python! WiFi DoS and ownership attack 😀 😂
David Bombal Beginner 4y ago
HackTheBox Beep Walkthrough - LFI Exploitation
Cybersecurity ⚡ AI Lesson
HackTheBox Beep Walkthrough - LFI Exploitation
HackerSploit Intermediate 4y ago
HackTheBox - Spectra
Cybersecurity
HackTheBox - Spectra
IppSec Beginner 4y ago
This is just too fast! 100 GbE // 100 Gigabit Ethernet!
Cybersecurity
This is just too fast! 100 GbE // 100 Gigabit Ethernet!
David Bombal Advanced 4y ago
HackTheBox - Tentacle
Cybersecurity
HackTheBox - Tentacle
IppSec Beginner 4y ago
burp suite
Cybersecurity
burp suite
David Bombal Beginner 4y ago
I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit
Cybersecurity ⚡ AI Lesson
I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit
SANS Institute Advanced 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
Cybersecurity ⚡ AI Lesson
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
HackTheBox - Tenet
Cybersecurity ⚡ AI Lesson
HackTheBox - Tenet
IppSec Beginner 4y ago
Kali Linux 2021.2 zero to WiFi (Free install)
Cybersecurity
Kali Linux 2021.2 zero to WiFi (Free install)
David Bombal Beginner 4y ago
HackTheBox - ScriptKiddie
Cybersecurity ⚡ AI Lesson
HackTheBox - ScriptKiddie
IppSec Intermediate 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
Cybersecurity ⚡ AI Lesson
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
Cybersecurity
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
David Bombal Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
Cybersecurity ⚡ AI Lesson
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Cybersecurity
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Lex Fridman Beginner 4y ago
HackTheBox - Cereal
Cybersecurity
HackTheBox - Cereal
IppSec Beginner 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
AJ Yawn: Cloud, Compliance and Automating Security
Cybersecurity ⚡ AI Lesson
AJ Yawn: Cloud, Compliance and Automating Security
SANS Institute Beginner 4y ago
TryHackMe - Vulnversity Walkthrough
Cybersecurity ⚡ AI Lesson
TryHackMe - Vulnversity Walkthrough
HackerSploit Intermediate 4y ago
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Cybersecurity ⚡ AI Lesson
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Lex Fridman Beginner 4y ago
Passwords: Am i a joke to you?
Cybersecurity
Passwords: Am i a joke to you?
David Bombal Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
SC-200 Microsoft Security Operations Analyst
📚 Coursera Course ↗
Self-paced
SC-200 Microsoft Security Operations Analyst
Opens on Coursera ↗
Nessus Scanner - Network Scanning from Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Nessus Scanner - Network Scanning from Beginner to Advanced
Opens on Coursera ↗
Cloud Security on AWS
📚 Coursera Course ↗
Self-paced
Cloud Security on AWS
Opens on Coursera ↗
Segurança no GKE com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Segurança no GKE com Cloud Next Generation Firewall
Opens on Coursera ↗
The Beginners Cyber Security Awareness Training Course
📚 Coursera Course ↗
Self-paced
The Beginners Cyber Security Awareness Training Course
Opens on Coursera ↗
Ethical Hacking - Capture the Flag Walkthroughs - v2
📚 Coursera Course ↗
Self-paced
Ethical Hacking - Capture the Flag Walkthroughs - v2
Opens on Coursera ↗