✕ Clear filters
1,802 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
Incident Response: Azure Log Analysis
🔐 Cybersecurity
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
🔐 Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Capture the Flag: Hacking Yet Another Markup Language
🔐 Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
🔐 Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
🔐 Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
🔐 Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
🔐 Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
🔐 Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
🔐 Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
🔐 Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
How Hackers Hide From Memory Scanners
🔐 Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
they're selling WHAT on Telegram?!?
🔐 Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
ChatGPT Learns the Rust Programming Language
🔐 Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
I Stole a Microsoft 365 Account. Here's How.
🔐 Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
🔐 Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
🔐 Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
🔐 Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
🔐 Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
🔐 Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
🔐 Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
🔐 Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
🔐 Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
🔐 Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Create Your Own Dark Web Website
🔐 Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
Website Vulnerabilities to Fully Hacked Server
🔐 Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
🔐 Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
How Hackers Exploit Vulnerable Drivers
🔐 Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
🔐 Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
VULNERABLE Kernel Drivers for Security Research
🔐 Cybersecurity
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
New "Dark Web" Generative AI Chatbots?!
🔐 Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Exploring the Latest Malware Samples
🔐 Cybersecurity
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
Run ANY Linux Program In Memory
🛡️ AI Safety & Ethics
Run ANY Linux Program In Memory
John Hammond Intermediate 2y ago
Which Visual Studio Code Extensions Can Be Hacked?
📰 AI News & Updates
Which Visual Studio Code Extensions Can Be Hacked?
John Hammond Intermediate 2y ago
I Explored Ransomware Cybercrime on the Dark Web
🔐 Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
The Mysterious "Office Hotkey"..
🛡️ AI Safety & Ethics
The Mysterious "Office Hotkey"..
John Hammond Intermediate 2y ago
How To Pivot Through a Network with Chisel
🔐 Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
🔐 Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
AT&T Email List Exposed
🛡️ AI Safety & Ethics
AT&T Email List Exposed
John Hammond Intermediate 2y ago
Learn Active Directory Kerberoasting
🔐 Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Trick Hackers with a Fake User
🛡️ AI Safety & Ethics
Trick Hackers with a Fake User
John Hammond Advanced 2y ago
The FBI Disrupted a HUGE Malware Strain
📰 AI News & Updates
The FBI Disrupted a HUGE Malware Strain
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
🔐 Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
How Does Malware Know It's Being Monitored?
🛡️ AI Safety & Ethics
How Does Malware Know It's Being Monitored?
John Hammond Beginner 2y ago
We Hacked An AWS Account. Again.
🧠 Large Language Models
We Hacked An AWS Account. Again.
John Hammond Beginner 2y ago
I Had ChatGPT Analyze My Code
🧠 Large Language Models
I Had ChatGPT Analyze My Code
John Hammond Intermediate 2y ago
Spoof Your Computer
🛡️ AI Safety & Ethics
Spoof Your Computer
John Hammond Advanced 2y ago
Not All ZIP Files Are Equal
🔐 Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
How to Hack ArgoCD to Cluster Administrator
📰 AI News & Updates
How to Hack ArgoCD to Cluster Administrator
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Game Theory II: Advanced Applications
📚 Coursera Course ↗
Self-paced
Game Theory II: Advanced Applications
Opens on Coursera ↗
Introduction to AI and Machine Learning
📚 Coursera Course ↗
Self-paced
Introduction to AI and Machine Learning
Opens on Coursera ↗
AI Infrastructure and Operations Fundamentals
📚 Coursera Course ↗
Self-paced
AI Infrastructure and Operations Fundamentals
Opens on Coursera ↗
Custom Models, Layers, and Loss Functions with TensorFlow
📚 Coursera Course ↗
Self-paced
Custom Models, Layers, and Loss Functions with TensorFlow
Opens on Coursera ↗
Cyber Security: GRC Part 1 - Governance
📚 Coursera Course ↗
Self-paced
Cyber Security: GRC Part 1 - Governance
Opens on Coursera ↗
CQRS, API Development, and Module Communication
📚 Coursera Course ↗
Self-paced
CQRS, API Development, and Module Communication
Opens on Coursera ↗