✕ Clear filters
33 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,218📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
🔐 Cybersecurity
State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
John Hammond Advanced 1w ago
Clawdbot Malware
🔐 Cybersecurity
Clawdbot Malware
John Hammond Advanced 2mo ago
so malware is invisible now lol
🔐 Cybersecurity
so malware is invisible now lol
John Hammond Advanced 3mo ago
Next.js & React vulnerability will break the internet
🔐 Cybersecurity
Next.js & React vulnerability will break the internet
John Hammond Advanced 3mo ago
The State of Cybercrime in 2025 Part 2 (with Nick Ascoli!)
🔐 Cybersecurity
The State of Cybercrime in 2025 Part 2 (with Nick Ascoli!)
John Hammond Advanced 4mo ago
Career Questions with Rob Fuller @mubix!
🔐 Cybersecurity
Career Questions with Rob Fuller @mubix!
John Hammond Advanced 4mo ago
The State of Cybercrime in 2025 (with Nick Ascoli!)
🔐 Cybersecurity
The State of Cybercrime in 2025 (with Nick Ascoli!)
John Hammond Advanced 4mo ago
Window Batch Malware Analysis!
🔐 Cybersecurity
Window Batch Malware Analysis!
John Hammond Advanced 4mo ago
Script-Based Malware Analysis!
🔐 Cybersecurity
Script-Based Malware Analysis!
John Hammond Advanced 5mo ago
hackers have gone TOO FAR
🔐 Cybersecurity
hackers have gone TOO FAR
John Hammond Advanced 7mo ago
The Entire Internet is Broken
🔐 Cybersecurity
The Entire Internet is Broken
John Hammond Advanced 7mo ago
this malware hides in a WALLPAPER
🔐 Cybersecurity
this malware hides in a WALLPAPER
John Hammond Advanced 9mo ago
FAKE Gambling Cheat Runs Malware
🔐 Cybersecurity
FAKE Gambling Cheat Runs Malware
John Hammond Advanced 10mo ago
Can you handle a cyber attack? TryHackMe SOC Simulator
🔐 Cybersecurity
Can you handle a cyber attack? TryHackMe SOC Simulator
John Hammond Advanced 1y ago
stop falling for this (disable Win+R run dialog)
🔐 Cybersecurity
stop falling for this (disable Win+R run dialog)
John Hammond Advanced 1y ago
Godot Game Used As Malware
🔐 Cybersecurity
Godot Game Used As Malware
John Hammond Advanced 1y ago
Bruteforcing Windows Defender Exclusions
🔐 Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
Ransomware In Action: MedusaLocker ReadText34
🔐 Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
Fileless Malware Analysis & PowerShell Deobfuscation
🔐 Cybersecurity
Fileless Malware Analysis & PowerShell Deobfuscation
John Hammond Advanced 1y ago
Don't Use CyberChef. Use This Instead.
🔐 Cybersecurity
Don't Use CyberChef. Use This Instead.
John Hammond Advanced 2y ago
Microsoft Entra Training
🔐 Cybersecurity
Microsoft Entra Training
John Hammond Advanced 2y ago
Technical Term Tips
🔐 Cybersecurity
Technical Term Tips
John Hammond Advanced 2y ago
i BACKDOORED a Desktop Shortcut (to run malware)
🔐 Cybersecurity
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond Advanced 2y ago
Hackers Steal Passwords & Personal Information
🔐 Cybersecurity
Hackers Steal Passwords & Personal Information
John Hammond Advanced 2y ago
I Put A Fake Email Server On The Internet
🔐 Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
This Company Got Hacked... but HOW?
🔐 Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
Incident Response: Azure Log Analysis
🔐 Cybersecurity
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
VULNERABLE Kernel Drivers for Security Research
🔐 Cybersecurity
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
Exploring the Latest Malware Samples
🔐 Cybersecurity
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
"Please Hack My Computer"
🔐 Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
I Tried The HackTheBox Certified Pentester Exam
🔐 Cybersecurity
I Tried The HackTheBox Certified Pentester Exam
John Hammond Advanced 3y ago
Evading Filters to Dump Databases (like a hacker)
🔐 Cybersecurity
Evading Filters to Dump Databases (like a hacker)
John Hammond Advanced 3y ago
"Advanced" Tips & Tricks for Capture The Flag
🔐 Cybersecurity
"Advanced" Tips & Tricks for Capture The Flag
John Hammond Advanced 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ransomware Playbook - A Complete Guide for IT Professionals
📚 Coursera Course ↗
Self-paced
Ransomware Playbook - A Complete Guide for IT Professionals
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Learn & Secure
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Learn & Secure
Opens on Coursera ↗
Cloud Computing Security - Bachelor's
📚 Coursera Course ↗
Self-paced
Cloud Computing Security - Bachelor's
Opens on Coursera ↗
Connect and Protect: Networks and Network Security
📚 Coursera Course ↗
Self-paced
Connect and Protect: Networks and Network Security
Opens on Coursera ↗
AI Agents for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI Agents for Cybersecurity
Opens on Coursera ↗
Homeland Security and Cybersecurity Future
📚 Coursera Course ↗
Self-paced
Homeland Security and Cybersecurity Future
Opens on Coursera ↗