✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
QR Codes on Linux
🛡️ AI Safety & Ethics
QR Codes on Linux
John Hammond Intermediate 1y ago
Decode Hex on Linux
🛡️ AI Safety & Ethics
Decode Hex on Linux
John Hammond Intermediate 1y ago
CrowdStrike Outage Recovery with BitLocker
🛡️ AI Safety & Ethics
CrowdStrike Outage Recovery with BitLocker
John Hammond Intermediate 1y ago
How Hackers Compromise BIG Networks (with NetExec)
🔐 Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
🔐 Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
🔐 Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
The Secrets of The Tor Browser
🔐 Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
🔐 Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
Free Coding Tool Distributes Malware
🔐 Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Notepad.exe Will Snitch On You (full coding project)
🔐 Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
🔐 Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
🔐 Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
🔐 Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
🔐 Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
🔐 Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
🔐 Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
🔐 Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Run this script with Eval
🔐 Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
🔐 Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
🔐 Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
🔐 Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
🔐 Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
🔐 Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Make Malware Analysis FASTER with Binary Emulation
🔐 Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
🔐 Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
🔐 Cybersecurity
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
🔐 Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
🔐 Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
🔐 Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
🔐 Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
🔐 Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
🔐 Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
🔐 Cybersecurity
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
How Hackers Move Through Networks (with Ligolo)
🔐 Cybersecurity
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
This Windows Program can CLONE ITSELF
🔐 Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
I Hacked Another File Upload Website
🔐 Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
🔐 Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
How To Hack APIs with Python
🔐 Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
🔐 Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
🔐 Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Capture the Flag: Hacking Yet Another Markup Language
🔐 Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
🔐 Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
🔐 Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
🔐 Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
🔐 Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
🔐 Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
🔐 Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
🔐 Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Machine Learning with Python & Statistics
📚 Coursera Course ↗
Self-paced
Machine Learning with Python & Statistics
Opens on Coursera ↗
Advanced Cybersecurity Risk Management
📚 Coursera Course ↗
Self-paced
Advanced Cybersecurity Risk Management
Opens on Coursera ↗
Business Application of Machine Learning and Artificial Intelligence in Healthcare
📚 Coursera Course ↗
Self-paced
Business Application of Machine Learning and Artificial Intelligence in Healthcare
Opens on Coursera ↗
Social Media Marketing
📚 Coursera Course ↗
Self-paced
Social Media Marketing
Opens on Coursera ↗
Python Generators
📚 Coursera Course ↗
Self-paced
Python Generators
Opens on Coursera ↗
Implementation of PhET Activities for STEM Education
📚 Coursera Course ↗
Self-paced
Implementation of PhET Activities for STEM Education
Opens on Coursera ↗