✕ Clear filters
5,299 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 186,417📚 Coursera 16,786
Key Take-Aways from SEC503: Intrusion Detection In-Depth
Cybersecurity ⚡ AI Lesson
Key Take-Aways from SEC503: Intrusion Detection In-Depth
SANS Institute Beginner 6y ago
RESET Your MINDSET - Motivational Speech For Finding Success Garret J. White
Cybersecurity
RESET Your MINDSET - Motivational Speech For Finding Success Garret J. White
Russell Brunson Beginner 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
LiveUnderflow Intermediate 6y ago
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
Cybersecurity
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
John Hammond Intermediate 6y ago
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
Cybersecurity
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
SANS Institute Intermediate 6y ago
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
Cybersecurity
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
John Hammond Intermediate 6y ago
You can also code! Network Engineer programs Cisco Viptela SD-WAN using Python! DevNet demo
Cybersecurity
You can also code! Network Engineer programs Cisco Viptela SD-WAN using Python! DevNet demo
David Bombal Beginner 6y ago
How To Setup A Sandbox Environment For Malware Analysis
Cybersecurity ⚡ AI Lesson
How To Setup A Sandbox Environment For Malware Analysis
HackerSploit Intermediate 6y ago
Don't bury your head in the sand! Start Now! DevNet to the rescue.
Cybersecurity
Don't bury your head in the sand! Start Now! DevNet to the rescue.
David Bombal Beginner 6y ago
Remcos RAT Review - The Most Advanced Remote Access Tool
Cybersecurity ⚡ AI Lesson
Remcos RAT Review - The Most Advanced Remote Access Tool
HackerSploit Advanced 6y ago
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
Cybersecurity ⚡ AI Lesson
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor Beginner 6y ago
Writing a Pentest Report
Cybersecurity ⚡ AI Lesson
Writing a Pentest Report
The Cyber Mentor Beginner 6y ago
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
Cybersecurity
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
LiveOverflow Intermediate 6y ago
HackTheBox - Chaos
Cybersecurity
HackTheBox - Chaos
IppSec Beginner 6y ago
HackTheBox - Conceal
Cybersecurity
HackTheBox - Conceal
IppSec Beginner 6y ago
Crypto: Classic RSA with a Twist (ParsonsCTF)
Cybersecurity ⚡ AI Lesson
Crypto: Classic RSA with a Twist (ParsonsCTF)
John Hammond Intermediate 6y ago
Linux Essentials: Curl Fundamentals
Cybersecurity ⚡ AI Lesson
Linux Essentials: Curl Fundamentals
HackerSploit Intermediate 6y ago
Facebook CTF - SQL Injection with Spaces (Products Manager)
Cybersecurity
Facebook CTF - SQL Injection with Spaces (Products Manager)
John Hammond Intermediate 6y ago
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
Cybersecurity
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
David Bombal Beginner 6y ago
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
Cybersecurity
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
Cybersecurity
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
David Bombal Beginner 6y ago
Post Exploitation With Empire And LaZagne
Cybersecurity ⚡ AI Lesson
Post Exploitation With Empire And LaZagne
HackerSploit Intermediate 6y ago
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
Cybersecurity
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
Cybersecurity
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
Cybersecurity
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
David Bombal Beginner 6y ago
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
Cybersecurity ⚡ AI Lesson
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor Beginner 6y ago
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
Cybersecurity
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
Cybersecurity
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
bWAPP - Server-Side Include (SSI) Injection
Cybersecurity ⚡ AI Lesson
bWAPP - Server-Side Include (SSI) Injection
HackerSploit Intermediate 6y ago
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
Cybersecurity
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
David Bombal Beginner 6y ago
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
bWAPP - OS Command Injection With Commix (All levels)
Cybersecurity ⚡ AI Lesson
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Stored (Blog)
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Reflected POST
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 6y ago
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
Cybersecurity ⚡ AI Lesson
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor Beginner 6y ago
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
Cybersecurity ⚡ AI Lesson
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor Beginner 6y ago
CrunchBangPlusPlus - #!++ - Installation & Review
Cybersecurity ⚡ AI Lesson
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 6y ago
Bug Bounty Hunting - PHP Code Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 6y ago
HackTheBox - LightWeight
Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 6y ago
Heartbleed Exploit - Discovery & Exploitation
Cybersecurity ⚡ AI Lesson
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 6y ago
A Day in the Life of an Ethical Hacker / Penetration Tester
Cybersecurity ⚡ AI Lesson
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor Beginner 6y ago
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
Cybersecurity ⚡ AI Lesson
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor Beginner 6y ago
Installing Windows Server 2016 on VMWare in 5 Minutes
Cybersecurity ⚡ AI Lesson
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor Beginner 6y ago
How To Backup Linux Systems With Grsync
Cybersecurity ⚡ AI Lesson
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Real-Time Cyber Threat Detection and Mitigation
📚 Coursera Course ↗
Self-paced
Real-Time Cyber Threat Detection and Mitigation
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in iOS
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in iOS
Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 2
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 2
Opens on Coursera ↗
Hands-On Web App Pentesting
📚 Coursera Course ↗
Self-paced
Hands-On Web App Pentesting
Opens on Coursera ↗
Practical Cybersecurity Fundamentals: Unit 3
📚 Coursera Course ↗
Self-paced
Practical Cybersecurity Fundamentals: Unit 3
Opens on Coursera ↗
Protection of Information Assets
📚 Coursera Course ↗
Self-paced
Protection of Information Assets
Opens on Coursera ↗