✕ Clear filters
542 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
This File Steals Passwords
📰 AI News & Updates
This File Steals Passwords
John Hammond Beginner 1y ago
Hackers Use Github For Malware
📰 AI News & Updates
Hackers Use Github For Malware
John Hammond Beginner 1y ago
Finding WEIRD Devices on the Public Internet
📰 AI News & Updates
Finding WEIRD Devices on the Public Internet
John Hammond Beginner 1y ago
Government Unveils Malware Analysis Tool, But...
🔐 Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 1y ago
Bypassing SmartScreen on Web Browsers
📰 AI News & Updates
Bypassing SmartScreen on Web Browsers
John Hammond Beginner 1y ago
Telegram Has Been Hacked
📰 AI News & Updates
Telegram Has Been Hacked
John Hammond Beginner 1y ago
Scraping Dark Web Sites with Python
🔐 Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 1y ago
How Hackers Can Hide PowerShell in Environment Variables
🔐 Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 1y ago
Malware & Cybersecurity Threats on the Horizon
🔐 Cybersecurity
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 1y ago
Hackers Hide with Clever Alternate Data Streams
🔐 Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 1y ago
The Apex Legends Hacker: Destroyer2009
📰 AI News & Updates
The Apex Legends Hacker: Destroyer2009
John Hammond Beginner 2y ago
Github Copilot Made My Code More Vulnerable
💻 AI-Assisted Coding
Github Copilot Made My Code More Vulnerable
John Hammond Beginner 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
🔐 Cybersecurity
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
Hackers Can Phish with PLAINTEXT QR Codes
📰 AI News & Updates
Hackers Can Phish with PLAINTEXT QR Codes
John Hammond Beginner 2y ago
I Made Malware In Under 20 Minutes
🔐 Cybersecurity
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
Sweet New Threat Intel Just Dropped
🔐 Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Malware Analysis Made Easy: Cloud Investigations
🔐 Cybersecurity
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
🔐 Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
Learning Entra ID (Azure Active Directory)
🔐 Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
🔐 Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
How to Hack Active Directory with ASREP Roasting
🔐 Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
Create Your Own File Extension
🔐 Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
🔐 Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
Writing Custom Malware: Import Address Table Hooking
🔐 Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
🔐 Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
How Hackers Hide From Memory Scanners
🔐 Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
ChatGPT Learns the Rust Programming Language
🔐 Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
Create Your Own Dark Web Website
🔐 Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
How Hackers Exploit Vulnerable Drivers
🔐 Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
🔐 Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
I Explored Ransomware Cybercrime on the Dark Web
🔐 Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
Learn Active Directory Kerberoasting
🔐 Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
How Does Malware Know It's Being Monitored?
🛡️ AI Safety & Ethics
How Does Malware Know It's Being Monitored?
John Hammond Beginner 2y ago
We Hacked An AWS Account. Again.
🧠 Large Language Models
We Hacked An AWS Account. Again.
John Hammond Beginner 2y ago
How Hackers & Malware Spoof Processes
🛡️ AI Safety & Ethics
How Hackers & Malware Spoof Processes
John Hammond Beginner 2y ago
Zimbra ZCS 0-day Exploited In The Wild
🔐 Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
Dependency Confusion with AWS CodeArtifact
🛠️ AI Tools & Apps
Dependency Confusion with AWS CodeArtifact
John Hammond Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
🔐 Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
How Hackers Write Malware & Evade Antivirus (Nim)
🛡️ AI Safety & Ethics
How Hackers Write Malware & Evade Antivirus (Nim)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
🔐 Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
Stealing OAuth Github Tokens with AWS CodeBuild
🧠 Large Language Models
Stealing OAuth Github Tokens with AWS CodeBuild
John Hammond Beginner 2y ago
Bypassing Branch Protections with Github Actions (CI/CD)
🛡️ AI Safety & Ethics
Bypassing Branch Protections with Github Actions (CI/CD)
John Hammond Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
🔐 Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
FAKE Microsoft Login to Hacked Charity Scam
📰 AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
Hands-on Ransomware: Exploring Cybercrime
🛡️ AI Safety & Ethics
Hands-on Ransomware: Exploring Cybercrime
John Hammond Beginner 2y ago
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
📊 Data Analytics & Business Intelligence
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
John Hammond Beginner 2y ago
How Can CI/CD Go Horribly Wrong?
🛡️ AI Safety & Ethics
How Can CI/CD Go Horribly Wrong?
John Hammond Beginner 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
🔐 Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Production-Ready Multimodal ML Engineering
📚 Coursera Course ↗
Self-paced
Production-Ready Multimodal ML Engineering
Opens on Coursera ↗
Welcome to Munich
📚 Coursera Course ↗
Self-paced
Welcome to Munich
Opens on Coursera ↗
LLM Fine-Tuning and Customization Training
📚 Coursera Course ↗
Self-paced
LLM Fine-Tuning and Customization Training
Opens on Coursera ↗
International Supply Chains and Logistics
📚 Coursera Course ↗
Self-paced
International Supply Chains and Logistics
Opens on Coursera ↗
Computer Simulations
📚 Coursera Course ↗
Self-paced
Computer Simulations
Opens on Coursera ↗
Doing Business in Europe
📚 Coursera Course ↗
Self-paced
Doing Business in Europe
Opens on Coursera ↗