✕ Clear filters
5,299 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 186,417📚 Coursera 16,786
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
Cybersecurity ⚡ AI Lesson
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
SANS Institute Intermediate 7y ago
HackTheBox - Ypuffy
Cybersecurity
HackTheBox - Ypuffy
IppSec Intermediate 7y ago
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 7: Finding the Right Module
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor Beginner 7y ago
Burning Down the Haystack - SANS Security Operations Summit 2018
Cybersecurity ⚡ AI Lesson
Burning Down the Haystack - SANS Security Operations Summit 2018
SANS Institute Intermediate 7y ago
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
Cybersecurity
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
David Bombal Beginner 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
Vim Editor Fundamentals
Cybersecurity ⚡ AI Lesson
Vim Editor Fundamentals
HackerSploit Intermediate 7y ago
Netstat Commands - Network Administration Tutorial
Cybersecurity ⚡ AI Lesson
Netstat Commands - Network Administration Tutorial
HackerSploit Beginner 7y ago
Reality Check: Is Network Automation hype? Is this stuff actually real?
Cybersecurity
Reality Check: Is Network Automation hype? Is this stuff actually real?
David Bombal Intermediate 7y ago
Growth Design Workshop (Hacking Growth + Design Sprint)
Cybersecurity
Growth Design Workshop (Hacking Growth + Design Sprint)
AJ&Smart Beginner 7y ago
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Cybersecurity ⚡ AI Lesson
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Wes McDowell Beginner 7y ago
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
Cybersecurity
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
LiveOverflow Intermediate 7y ago
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
HackTheBox - SecNotes
Cybersecurity ⚡ AI Lesson
HackTheBox - SecNotes
IppSec Intermediate 7y ago
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
Cybersecurity
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
freeCodeCamp.org Beginner 7y ago
Big Brother: China Edition!
Cybersecurity ⚡ AI Lesson
Big Brother: China Edition!
ColdFusion Beginner 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
Cybersecurity ⚡ AI Lesson
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
a16z Podcast | The Law (and Tech) of Warfare
Cybersecurity ⚡ AI Lesson
a16z Podcast | The Law (and Tech) of Warfare
a16z Beginner 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 4: Finding the Offset
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 3: Fuzzing
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 2: Spiking
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 1: Introduction
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor Beginner 7y ago
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
Cybersecurity
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
SANS Institute Intermediate 7y ago
Everything New is Old Again - SANS Secure DevOps Summit 2018
Cybersecurity
Everything New is Old Again - SANS Secure DevOps Summit 2018
SANS Institute Beginner 7y ago
Nano Editor Fundamentals
Cybersecurity ⚡ AI Lesson
Nano Editor Fundamentals
HackerSploit Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
Cybersecurity ⚡ AI Lesson
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
Cybersecurity ⚡ AI Lesson
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
Unicornscan - Port Scanning
Cybersecurity ⚡ AI Lesson
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
SANS ICS Security Summit & Training 2019
Cybersecurity
SANS ICS Security Summit & Training 2019
SANS Institute Advanced 7y ago
HackTheBox - Arctic - Walkthrough
Cybersecurity ⚡ AI Lesson
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
HackTheBox - Oz
Cybersecurity
HackTheBox - Oz
IppSec Beginner 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
Cybersecurity ⚡ AI Lesson
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
HackTheBox - Mischief
Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
C Programming Fundamentals - Loops
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
Cybersecurity
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
David Bombal Beginner 7y ago
C Programming Fundamentals - Functions And Variables
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
a16z Podcast | On Wearables, Quantified Self, and Biohacking
Cybersecurity ⚡ AI Lesson
a16z Podcast | On Wearables, Quantified Self, and Biohacking
a16z Beginner 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
Cybersecurity ⚡ AI Lesson
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
Cybersecurity ⚡ AI Lesson
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
Cybersecurity
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
David Bombal Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cyber Espionage and Counterintelligence
📚 Coursera Course ↗
Self-paced
Cyber Espionage and Counterintelligence
Opens on Coursera ↗
 IT Security: Defense against the digital dark arts
📚 Coursera Course ↗
Self-paced
IT Security: Defense against the digital dark arts
Opens on Coursera ↗
Ethical Hacking
📚 Coursera Course ↗
Self-paced
Ethical Hacking
Opens on Coursera ↗
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
FortiGate Administrator
📚 Coursera Course ↗
Self-paced
FortiGate Administrator
Opens on Coursera ↗
Design security solutions for applications and data
📚 Coursera Course ↗
Self-paced
Design security solutions for applications and data
Opens on Coursera ↗