✕ Clear filters
542 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
Hunt for Hackers with Velociraptor
🛡️ AI Safety & Ethics
Hunt for Hackers with Velociraptor
John Hammond Beginner 2y ago
Quick Forensics of Windows Event Logs (DeepBlueCLI)
🛡️ AI Safety & Ethics
Quick Forensics of Windows Event Logs (DeepBlueCLI)
John Hammond Beginner 2y ago
What SECRETS are in your Clipboard?
🔐 Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
🔐 Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
How FAST Can You Write a Pentest Report?
🔐 Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 2y ago
The Latest YouTube Malware Scam
🖊️ Copywriting & Content Strategy
The Latest YouTube Malware Scam
John Hammond Beginner 2y ago
3CX VOIP Compromised & Supply Chain Threat
📰 AI News & Updates
3CX VOIP Compromised & Supply Chain Threat
John Hammond Beginner 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
🔐 Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
🔐 Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
a Hacker's Backdoor: Service Control Manager
📰 AI News & Updates
a Hacker's Backdoor: Service Control Manager
John Hammond Beginner 3y ago
Unraveling Discord Token Stealer (python MALWARE)
🔐 Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
Is This Website LEAKING?
🔐 Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
🔐 Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
🔐 Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
Internet Explorer Forced to Run Malware
🛡️ AI Safety & Ethics
Internet Explorer Forced to Run Malware
John Hammond Beginner 3y ago
Fake OBS Studio Hack Targeting YouTubers
🛡️ AI Safety & Ethics
Fake OBS Studio Hack Targeting YouTubers
John Hammond Beginner 3y ago
3 Things You Didn't Know about Windows Command Prompt
🛡️ AI Safety & Ethics
3 Things You Didn't Know about Windows Command Prompt
John Hammond Beginner 3y ago
How To Bypass Website File Upload Restrictions
🔐 Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
🔐 Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
🔐 Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
🔐 Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
🔐 Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
🔐 Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
🔐 Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
🔐 Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
🔐 Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
🔐 Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
🔐 Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
🔐 Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
🔐 Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
🔐 Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
🔐 Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
🔐 Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
TryHackMe! Advent of Cyber 2022 Kick-Off
🔐 Cybersecurity
TryHackMe! Advent of Cyber 2022 Kick-Off
John Hammond Beginner 3y ago
catch EVERY reverse shell while hacking! (VILLAIN)
🔐 Cybersecurity
catch EVERY reverse shell while hacking! (VILLAIN)
John Hammond Beginner 3y ago
Your choices matter… Responsible Red Teaming w/ HuskyHacks
🔐 Cybersecurity
Your choices matter… Responsible Red Teaming w/ HuskyHacks
John Hammond Beginner 3y ago
you should be using PODMAN
🔐 Cybersecurity
you should be using PODMAN
John Hammond Beginner 3y ago
CUSTOM Java Deserialization Exploit - Serial Snyker
🔐 Cybersecurity
CUSTOM Java Deserialization Exploit - Serial Snyker
John Hammond Beginner 3y ago
Cybercrime & Dark Web Conversations (w/ Shmuel!)
🔐 Cybersecurity
Cybercrime & Dark Web Conversations (w/ Shmuel!)
John Hammond Beginner 3y ago
Node.js "Pug" Server-Side Template Injection
🔐 Cybersecurity
Node.js "Pug" Server-Side Template Injection
John Hammond Beginner 3y ago
The King Of Malware is Back
🔐 Cybersecurity
The King Of Malware is Back
John Hammond Beginner 3y ago
Backup Server Hacked - SUPPLY CHAIN Code Execution
🔐 Cybersecurity
Backup Server Hacked - SUPPLY CHAIN Code Execution
John Hammond Beginner 3y ago
I store ALL my Passwords in AWS
🔐 Cybersecurity
I store ALL my Passwords in AWS
John Hammond Beginner 3y ago
NEW Python 3.11 !!!
🔐 Cybersecurity
NEW Python 3.11 !!!
John Hammond Beginner 3y ago
zip files & hack... (CVE-2022-1271 zgrep/gzip)
🔐 Cybersecurity
zip files & hack... (CVE-2022-1271 zgrep/gzip)
John Hammond Beginner 3y ago
How Hackers Hide
🔐 Cybersecurity
How Hackers Hide
John Hammond Beginner 3y ago
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
🔐 Cybersecurity
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
John Hammond Beginner 3y ago
VULNERABLE File Uploads (Python Django)
🔐 Cybersecurity
VULNERABLE File Uploads (Python Django)
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Six Sigma Tools for Improve and Control
📚 Coursera Course ↗
Self-paced
Six Sigma Tools for Improve and Control
Opens on Coursera ↗
Pivot Tables in Google Sheets
📚 Coursera Course ↗
Self-paced
Pivot Tables in Google Sheets
Opens on Coursera ↗
Introduction to R Programming for Data Science
📚 Coursera Course ↗
Self-paced
Introduction to R Programming for Data Science
Opens on Coursera ↗
Converting Users Into Brand Advocates And Champions
📚 Coursera Course ↗
Self-paced
Converting Users Into Brand Advocates And Champions
Opens on Coursera ↗
Leading High-Performance Sales Teams
📚 Coursera Course ↗
Self-paced
Leading High-Performance Sales Teams
Opens on Coursera ↗
Managing Data Lakes & Pipelines with Google Cloud Dataplex
📚 Coursera Course ↗
Self-paced
Managing Data Lakes & Pipelines with Google Cloud Dataplex
Opens on Coursera ↗