✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
Pentesting Methodologies & CTF Challenges!
🔐 Cybersecurity
Pentesting Methodologies & CTF Challenges!
John Hammond Intermediate 1y ago
NetworkChuck and I Just Banter
🛡️ AI Safety & Ethics
NetworkChuck and I Just Banter
John Hammond Intermediate 1y ago
PROGAMERS - Super Mario Party Jamboree with Friends
🛡️ AI Safety & Ethics
PROGAMERS - Super Mario Party Jamboree with Friends
John Hammond Intermediate 1y ago
Mastering File Layers: Unlocking Payload Secrets
🛡️ AI Safety & Ethics
Mastering File Layers: Unlocking Payload Secrets
John Hammond Intermediate 1y ago
Revolutionary Tool to Combat Session Hijacking Risks
🛡️ AI Safety & Ethics
Revolutionary Tool to Combat Session Hijacking Risks
John Hammond Intermediate 1y ago
Uncovering GNU vs. BusyBox TAR: The Hidden Tricks
🛡️ AI Safety & Ethics
Uncovering GNU vs. BusyBox TAR: The Hidden Tricks
John Hammond Intermediate 1y ago
Unlocking Your Browser: Secure Your Saved Passwords Today
🛡️ AI Safety & Ethics
Unlocking Your Browser: Secure Your Saved Passwords Today
John Hammond Intermediate 1y ago
Mastering Reddit Security: Log In Safely Every Time
🛡️ AI Safety & Ethics
Mastering Reddit Security: Log In Safely Every Time
John Hammond Intermediate 1y ago
Unpacking Code Vulnerabilities: A Layered Approach
🛡️ AI Safety & Ethics
Unpacking Code Vulnerabilities: A Layered Approach
John Hammond Intermediate 1y ago
Transform Your HTTP Server with index.html!
🛡️ AI Safety & Ethics
Transform Your HTTP Server with index.html!
John Hammond Intermediate 1y ago
Creating a New Tar Archive for Docker: Step-by-Step
🛡️ AI Safety & Ethics
Creating a New Tar Archive for Docker: Step-by-Step
John Hammond Intermediate 1y ago
How Hackers Use InfoStealer Malware to Impersonate You
🖌️ UI/UX Design
How Hackers Use InfoStealer Malware to Impersonate You
John Hammond Intermediate 1y ago
Exploring Alpine Docker: Manipulating User Files Securely
🛡️ AI Safety & Ethics
Exploring Alpine Docker: Manipulating User Files Securely
John Hammond Intermediate 1y ago
Understanding Cookies: Netscape Format & Malware Insights
🛡️ AI Safety & Ethics
Understanding Cookies: Netscape Format & Malware Insights
John Hammond Intermediate 1y ago
Unmasking Session Hijacking: Defend Your Accounts Now
🛡️ AI Safety & Ethics
Unmasking Session Hijacking: Defend Your Accounts Now
John Hammond Intermediate 1y ago
Mastering Python: Monitor Cookie Leaks with Poetry
🛡️ AI Safety & Ethics
Mastering Python: Monitor Cookie Leaks with Poetry
John Hammond Intermediate 1y ago
Mastering Text Editors: Unveiling Injection Points
🛡️ AI Safety & Ethics
Mastering Text Editors: Unveiling Injection Points
John Hammond Intermediate 1y ago
Protect Your Business: Flare's New Cookie Security Feature
🛡️ AI Safety & Ethics
Protect Your Business: Flare's New Cookie Security Feature
John Hammond Intermediate 1y ago
Exploring Remote Code Execution Triggers in Build Scripts
🛡️ AI Safety & Ethics
Exploring Remote Code Execution Triggers in Build Scripts
John Hammond Intermediate 1y ago
Session Hijacking: Hack Reddit with GoLogin Tools
🛡️ AI Safety & Ethics
Session Hijacking: Hack Reddit with GoLogin Tools
John Hammond Intermediate 1y ago
Streamline Your Alpine Container with Target.tar Transformation
🛡️ AI Safety & Ethics
Streamline Your Alpine Container with Target.tar Transformation
John Hammond Intermediate 1y ago
Uncovering InfoStealer Malware: What Does It Find?
🛡️ AI Safety & Ethics
Uncovering InfoStealer Malware: What Does It Find?
John Hammond Intermediate 1y ago
Boost Your Skills: Secure Your Apps with Snyk
🛡️ AI Safety & Ethics
Boost Your Skills: Secure Your Apps with Snyk
John Hammond Intermediate 1y ago
Uncovering Hidden Vulnerabilities in Custom Services
🛡️ AI Safety & Ethics
Uncovering Hidden Vulnerabilities in Custom Services
John Hammond Intermediate 1y ago
Stop Session Hijacking: How to Secure Your Cookies Now
🛡️ AI Safety & Ethics
Stop Session Hijacking: How to Secure Your Cookies Now
John Hammond Intermediate 1y ago
Uncovering TAR Payload Secrets: Extracting the Right Layers
🛡️ AI Safety & Ethics
Uncovering TAR Payload Secrets: Extracting the Right Layers
John Hammond Intermediate 1y ago
Uncovering Redline Info Stealer
🛡️ AI Safety & Ethics
Uncovering Redline Info Stealer
John Hammond Intermediate 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
🔐 Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
🔐 Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
🔐 Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Mastering tar Command Injection: A Deep Dive
🛡️ AI Safety & Ethics
Mastering tar Command Injection: A Deep Dive
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
🔐 Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
Discover the Hidden Vulnerability in Command Injection!
🛡️ AI Safety & Ethics
Discover the Hidden Vulnerability in Command Injection!
John Hammond Intermediate 1y ago
Protect Yourself: The Dangers of InfoStealer Malware
🛡️ AI Safety & Ethics
Protect Yourself: The Dangers of InfoStealer Malware
John Hammond Intermediate 1y ago
Exploring Docker: Downloading and Testing Build Scripts
🛡️ AI Safety & Ethics
Exploring Docker: Downloading and Testing Build Scripts
John Hammond Intermediate 1y ago
Stop Session Hijacking: Protect Your Accounts Now!
🛡️ AI Safety & Ethics
Stop Session Hijacking: Protect Your Accounts Now!
John Hammond Intermediate 1y ago
Mastering Command Injection: Extracting Layer.tar Like a Pro
🛡️ AI Safety & Ethics
Mastering Command Injection: Extracting Layer.tar Like a Pro
John Hammond Intermediate 1y ago
Mastering Token Access: Uncovering Microsoft Graph API Secrets
🧠 Large Language Models
Mastering Token Access: Uncovering Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Unlocking Docker Inside Docker: The DIND Revolution
🛡️ AI Safety & Ethics
Unlocking Docker Inside Docker: The DIND Revolution
John Hammond Intermediate 1y ago
Social Engineering: Accessing Microsoft Graph API Secrets
📰 AI News & Updates
Social Engineering: Accessing Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Mastering Docker: Build Your Own Authentication & Registry Service
🛡️ AI Safety & Ethics
Mastering Docker: Build Your Own Authentication & Registry Service
John Hammond Intermediate 1y ago
Clone Security Groups: Unveiling Rogue User Risks
🛡️ AI Safety & Ethics
Clone Security Groups: Unveiling Rogue User Risks
John Hammond Intermediate 1y ago
Unlocking the Secrets of Docker: A Creative Journey
🛡️ AI Safety & Ethics
Unlocking the Secrets of Docker: A Creative Journey
John Hammond Intermediate 1y ago
Unlocking Service User Secrets: Bypassing Authentication Flaws
🛡️ AI Safety & Ethics
Unlocking Service User Secrets: Bypassing Authentication Flaws
John Hammond Intermediate 1y ago
Unlocking Guest Invites: Secrets of EntraID
🛡️ AI Safety & Ethics
Unlocking Guest Invites: Secrets of EntraID
John Hammond Intermediate 1y ago
Master Docker Images with Scopio: Simplify Your Workflow
🛠️ AI Tools & Apps
Master Docker Images with Scopio: Simplify Your Workflow
John Hammond Intermediate 1y ago
Effortlessly Invite Guests with Graphrunner's Commandlet
🛡️ AI Safety & Ethics
Effortlessly Invite Guests with Graphrunner's Commandlet
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
🔐 Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Deploy a website to Azure with Azure App Service
📚 Coursera Course ↗
Self-paced
Deploy a website to Azure with Azure App Service
Opens on Coursera ↗
Create a Small Business Website with Weebly
📚 Coursera Course ↗
Self-paced
Create a Small Business Website with Weebly
Opens on Coursera ↗
Fitting Statistical Models to Data with Python
📚 Coursera Course ↗
Self-paced
Fitting Statistical Models to Data with Python
Opens on Coursera ↗
International Business Environment
📚 Coursera Course ↗
Self-paced
International Business Environment
Opens on Coursera ↗
Satisfacción garantizada: desarrolla estrategias de fidelización de clientes en línea
📚 Coursera Course ↗
Self-paced
Satisfacción garantizada: desarrolla estrategias de fidelización de clientes en línea
Opens on Coursera ↗
AZ-900 Microsoft Azure Fundamentals Exam Quick Prep
📚 Coursera Course ↗
Self-paced
AZ-900 Microsoft Azure Fundamentals Exam Quick Prep
Opens on Coursera ↗