✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,243📚 Coursera 18,118🎤 TED 1
they're selling WHAT on Telegram?!?
🔐 Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
🔐 Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
🔐 Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
🔐 Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
🔐 Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
🔐 Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
🔐 Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
🔐 Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
🔐 Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
🔐 Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
🔐 Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Website Vulnerabilities to Fully Hacked Server
🔐 Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
🔐 Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
🔐 Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Run ANY Linux Program In Memory
🛡️ AI Safety & Ethics
Run ANY Linux Program In Memory
John Hammond Intermediate 2y ago
Which Visual Studio Code Extensions Can Be Hacked?
📰 AI News & Updates
Which Visual Studio Code Extensions Can Be Hacked?
John Hammond Intermediate 2y ago
The Mysterious "Office Hotkey"..
🛡️ AI Safety & Ethics
The Mysterious "Office Hotkey"..
John Hammond Intermediate 2y ago
How To Pivot Through a Network with Chisel
🔐 Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
🔐 Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
AT&T Email List Exposed
🛡️ AI Safety & Ethics
AT&T Email List Exposed
John Hammond Intermediate 2y ago
The FBI Disrupted a HUGE Malware Strain
📰 AI News & Updates
The FBI Disrupted a HUGE Malware Strain
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
🔐 Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
I Had ChatGPT Analyze My Code
🧠 Large Language Models
I Had ChatGPT Analyze My Code
John Hammond Intermediate 2y ago
Not All ZIP Files Are Equal
🔐 Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
How to Hack ArgoCD to Cluster Administrator
📰 AI News & Updates
How to Hack ArgoCD to Cluster Administrator
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
🔐 Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Telegram Cybercrime is INSANE
🔐 Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
I Broke Threads
🛡️ AI Safety & Ethics
I Broke Threads
John Hammond Intermediate 2y ago
Compromising Terraform & AWS Atlantis Build Jobs
🛠️ AI Tools & Apps
Compromising Terraform & AWS Atlantis Build Jobs
John Hammond Intermediate 2y ago
Hunting Malware with Velociraptor (YARA & Memory Forensics)
🛡️ AI Safety & Ethics
Hunting Malware with Velociraptor (YARA & Memory Forensics)
John Hammond Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
🔐 Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
How to Trick Hackers & Web Crawlers with Spidertrap
🛡️ AI Safety & Ethics
How to Trick Hackers & Web Crawlers with Spidertrap
John Hammond Intermediate 2y ago
MOVEit Transfer Exploitation (my API presentation recording)
🛡️ AI Safety & Ethics
MOVEit Transfer Exploitation (my API presentation recording)
John Hammond Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
🔐 Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
🔐 Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Inside a Cybercrime Scam Operation
🛠️ AI Tools & Apps
Inside a Cybercrime Scam Operation
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
🔐 Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
How To Extract Plaintext Google Chrome Passwords
📰 AI News & Updates
How To Extract Plaintext Google Chrome Passwords
John Hammond Intermediate 2y ago
Now Scammers Can RENT Email Addresses for Cybercrime
🛡️ AI Safety & Ethics
Now Scammers Can RENT Email Addresses for Cybercrime
John Hammond Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
🔐 Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
🔐 Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
This Dark Web URL Shortener Sucks
🛡️ AI Safety & Ethics
This Dark Web URL Shortener Sucks
John Hammond Intermediate 2y ago
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
🛡️ AI Safety & Ethics
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond Intermediate 2y ago
ChatGPT Analyzes Fake ChatGPT Malware
🧠 Large Language Models
ChatGPT Analyzes Fake ChatGPT Malware
John Hammond Intermediate 2y ago
Why Don't People Want Security?
📊 Data Analytics & Business Intelligence
Why Don't People Want Security?
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
🔐 Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
🤖 AI Agents & Automation
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
John Hammond Intermediate 2y ago
PowerShell CRYPTOSTEALER through DNS
🛡️ AI Safety & Ethics
PowerShell CRYPTOSTEALER through DNS
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Creating a Culture of Performance
📚 Coursera Course ↗
Self-paced
Creating a Culture of Performance
Opens on Coursera ↗
Negotiation That Works: Strategies for Influence & Agreement
📚 Coursera Course ↗
Self-paced
Negotiation That Works: Strategies for Influence & Agreement
Opens on Coursera ↗
Le marketing dans un monde numérique
📚 Coursera Course ↗
Self-paced
Le marketing dans un monde numérique
Opens on Coursera ↗
Simulation and modeling of natural processes
📚 Coursera Course ↗
Self-paced
Simulation and modeling of natural processes
Opens on Coursera ↗
Introduction to Genetics and Evolution
📚 Coursera Course ↗
Self-paced
Introduction to Genetics and Evolution
Opens on Coursera ↗
Advanced Python - Reconnaissance
📚 Coursera Course ↗
Self-paced
Advanced Python - Reconnaissance
Opens on Coursera ↗