✕ Clear filters
5,267 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 185,257📚 Coursera 16,566
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Cybersecurity
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Hussein Nasser Intermediate 5y ago
What is TCP Fast Open and how can it speeds up your Backend Application?
Cybersecurity ⚡ AI Lesson
What is TCP Fast Open and how can it speeds up your Backend Application?
Hussein Nasser Beginner 5y ago
HackTheBox - ForwardSlash
Cybersecurity
HackTheBox - ForwardSlash
IppSec Beginner 5y ago
How To Convert Linux Packages With Alien
Cybersecurity ⚡ AI Lesson
How To Convert Linux Packages With Alien
HackerSploit Intermediate 5y ago
Our First Ever Virtual Conference...and This Happened.
Cybersecurity
Our First Ever Virtual Conference...and This Happened.
Russell Brunson Beginner 5y ago
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
Cybersecurity
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
SANS Institute Beginner 5y ago
#LevelUpLabs | SANS@MIC Talk
Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
HackTheBox - Player2
Cybersecurity
HackTheBox - Player2
IppSec Beginner 5y ago
How To Take Product Photography At Home With A Smartphone
Cybersecurity
How To Take Product Photography At Home With A Smartphone
Learn With Shopify Beginner 5y ago
Igniting Creativity for a (Hacking) Game - Game Devlog #2
Cybersecurity ⚡ AI Lesson
Igniting Creativity for a (Hacking) Game - Game Devlog #2
LiveOverflow Beginner 5y ago
you need to learn HACKING RIGHT NOW!! // CEH (ethical hacking)
Cybersecurity ⚡ AI Lesson
you need to learn HACKING RIGHT NOW!! // CEH (ethical hacking)
NetworkChuck Beginner 5y ago
HackTheBox Walkthrough - Tenten
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Tenten
HackerSploit Intermediate 5y ago
what am i doing?? (aws...security+.....ccna?)
Cybersecurity ⚡ AI Lesson
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
Joscha Bach: Artificial Consciousness and the Nature of Reality | Lex Fridman Podcast #101
Cybersecurity
Joscha Bach: Artificial Consciousness and the Nature of Reality | Lex Fridman Podcast #101
Lex Fridman Beginner 5y ago
NahamCon CTF starts TOMORROW!
Cybersecurity
NahamCon CTF starts TOMORROW!
John Hammond Beginner 5y ago
Spinning a lightweight RabbitMQ instance and Consume it with NodeJS
Cybersecurity
Spinning a lightweight RabbitMQ instance and Consume it with NodeJS
Hussein Nasser Beginner 5y ago
Building a Deno HTTPS Web Server with Self-Signed Certificate
Cybersecurity
Building a Deno HTTPS Web Server with Self-Signed Certificate
Hussein Nasser Intermediate 5y ago
How much can you learn about the Backend from its API?
Cybersecurity
How much can you learn about the Backend from its API?
Hussein Nasser Intermediate 5y ago
They Turned on HTTP/2 and Regretted it, Let us discuss the Lucidchart Article
Cybersecurity
They Turned on HTTP/2 and Regretted it, Let us discuss the Lucidchart Article
Hussein Nasser Beginner 5y ago
Wiresharking TLS - What happens during TLS 1.2 and TLS 1.3 Handshake
Cybersecurity
Wiresharking TLS - What happens during TLS 1.2 and TLS 1.3 Handshake
Hussein Nasser Beginner 5y ago
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Cybersecurity
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Hussein Nasser Intermediate 5y ago
What is a Request?
Cybersecurity ⚡ AI Lesson
What is a Request?
Hussein Nasser Beginner 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Untapped Potential - SANS Blue Team Summit 2020
Cybersecurity ⚡ AI Lesson
Untapped Potential - SANS Blue Team Summit 2020
SANS Institute Beginner 5y ago
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Cybersecurity
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Hussein Nasser Intermediate 5y ago
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Cybersecurity
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Hussein Nasser Advanced 5y ago
HackTheBox - ServMon
Cybersecurity ⚡ AI Lesson
HackTheBox - ServMon
IppSec Beginner 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
Cybersecurity ⚡ AI Lesson
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Cybersecurity
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Hussein Nasser Intermediate 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
HackTheBox Walkthrough - Optimum
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Optimum
HackerSploit Intermediate 5y ago
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
Cybersecurity
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
SANS Institute Beginner 5y ago
A Walk Through Logs Hell | SANS@MIC Talk
Cybersecurity
A Walk Through Logs Hell | SANS@MIC Talk
SANS Institute Beginner 5y ago
Shock to the System: Re-Evaluating Your Security Operations
Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
Learn Git
Cybersecurity ⚡ AI Lesson
Learn Git
HackerSploit Beginner 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Introducing Blueprint
Cybersecurity ⚡ AI Lesson
Introducing Blueprint
SANS Institute Beginner 5y ago
Cybertalk - EP6 - Don't Dual Boot
Cybersecurity ⚡ AI Lesson
Cybertalk - EP6 - Don't Dual Boot
HackerSploit Intermediate 5y ago
HackTheBox - Nest
Cybersecurity
HackTheBox - Nest
IppSec Beginner 5y ago
I PASSED the Linux+ (how to pass the CompTIA Linux+ Exam)
Cybersecurity ⚡ AI Lesson
I PASSED the Linux+ (how to pass the CompTIA Linux+ Exam)
NetworkChuck Beginner 5y ago
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
SANS Institute Beginner 5y ago