✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
🔐 Cybersecurity
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
John Hammond Beginner 7y ago
XMAS CTF HIGHLIGHTS
🔐 Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Coordinates to IMAGE & Back w/ PYTHON PIL
🔐 Cybersecurity
Coordinates to IMAGE & Back w/ PYTHON PIL
John Hammond Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
🔐 Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Examining Variables in GDB | learn gdb [33] picoCTF 2018
🔐 Cybersecurity
Examining Variables in GDB | learn gdb [33] picoCTF 2018
John Hammond Beginner 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
🔐 Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
🔐 Cybersecurity
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
John Hammond Intermediate 7y ago
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
🔐 Cybersecurity
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
John Hammond Intermediate 7y ago
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
🔐 Cybersecurity
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
John Hammond Intermediate 7y ago
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
🔐 Cybersecurity
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
John Hammond Intermediate 7y ago
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
🔐 Cybersecurity
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
John Hammond Intermediate 7y ago
picoCTF 2018 [28] RSA Madlibs
🔐 Cybersecurity
picoCTF 2018 [28] RSA Madlibs
John Hammond Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
🔐 Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
🔐 Cybersecurity
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
John Hammond Beginner 7y ago
picoCTF 2018 [26] Caesar Cipher 2
🔐 Cybersecurity
picoCTF 2018 [26] Caesar Cipher 2
John Hammond Intermediate 7y ago
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
🔐 Cybersecurity
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
John Hammond Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
🔐 Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
picoCTF 2018 [24] Assembly 2
🔐 Cybersecurity
picoCTF 2018 [24] Assembly 2
John Hammond Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
🔐 Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
🔐 Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
BsidesCT 2018 TRIVIA Challenges
🔐 Cybersecurity
BsidesCT 2018 TRIVIA Challenges
John Hammond Intermediate 7y ago
REPLICATING THE FACEBOOK HACK
🔐 Cybersecurity
REPLICATING THE FACEBOOK HACK
John Hammond Intermediate 7y ago
Securing Windows with DISA STIGs
🔐 Cybersecurity
Securing Windows with DISA STIGs
John Hammond Intermediate 7y ago
picoCTF 2018 [23] Absolutely Relative
🔐 Cybersecurity
picoCTF 2018 [23] Absolutely Relative
John Hammond Intermediate 7y ago
picoCTF 2018 [22] The Vault & What's My Name
🔐 Cybersecurity
picoCTF 2018 [22] The Vault & What's My Name
John Hammond Intermediate 7y ago
picoCTF 2018 [20] You Cant See Me & Buttons
🔐 Cybersecurity
picoCTF 2018 [20] You Cant See Me & Buttons
John Hammond Intermediate 7y ago
picoCTF 2018 [19] What Base Is This?
🔐 Cybersecurity
picoCTF 2018 [19] What Base Is This?
John Hammond Intermediate 7y ago
picoCTF 2018 [18] Shellcode
🔐 Cybersecurity
picoCTF 2018 [18] Shellcode
John Hammond Intermediate 7y ago
Reversing Engineering XOR | picoCTF [17] quackme
🔐 Cybersecurity
Reversing Engineering XOR | picoCTF [17] quackme
John Hammond Intermediate 7y ago
picoCTF 2018 [16] leak me & Now You See Me
🔐 Cybersecurity
picoCTF 2018 [16] leak me & Now You See Me
John Hammond Intermediate 7y ago
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
🔐 Cybersecurity
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
John Hammond Intermediate 7y ago
picoCTF 2018 [14] be-quick-or-be-dead 1 & blaise's cipher
🔐 Cybersecurity
picoCTF 2018 [14] be-quick-or-be-dead 1 & blaise's cipher
John Hammond Intermediate 7y ago
picoCTF 2018 [13] Truly an Artist & Assembly 1
🔐 Cybersecurity
picoCTF 2018 [13] Truly an Artist & Assembly 1
John Hammond Intermediate 7y ago
picoCTF 2018 [11] Hex Editor, SSH, Irish Name Repo
🔐 Cybersecurity
picoCTF 2018 [11] Hex Editor, SSH, Irish Name Repo
John Hammond Intermediate 7y ago
picoCTF 2018 [10] Caesar Cipher 1, ENV, & Hertz
🔐 Cybersecurity
picoCTF 2018 [10] Caesar Cipher 1, ENV, & Hertz
John Hammond Intermediate 7y ago
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
🔐 Cybersecurity
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
John Hammond Intermediate 7y ago
picoCTF 2018 [08] Recovering From The Snap & Admin Panel
🔐 Cybersecurity
picoCTF 2018 [08] Recovering From The Snap & Admin Panel
John Hammond Intermediate 7y ago
picoCTF 2018 [07] Logon & Reading Between The Eyes
🔐 Cybersecurity
picoCTF 2018 [07] Logon & Reading Between The Eyes
John Hammond Intermediate 7y ago
picoCTF 2018 [06] grep2, Aca-Shell-A, Client Side is Still Bad
🔐 Cybersecurity
picoCTF 2018 [06] grep2, Aca-Shell-A, Client Side is Still Bad
John Hammond Intermediate 7y ago
picoCTF 2018 [05] strings, pipe & Inspect Me
🔐 Cybersecurity
picoCTF 2018 [05] strings, pipe & Inspect Me
John Hammond Intermediate 7y ago
picoCTF 2018 [04] Here's Johnny!
🔐 Cybersecurity
picoCTF 2018 [04] Here's Johnny!
John Hammond Intermediate 7y ago
picoCTF 2018 [03]  Cryptography Warmups, grep & netcat
🔐 Cybersecurity
picoCTF 2018 [03] Cryptography Warmups, grep & netcat
John Hammond Intermediate 7y ago
picoCTF 2018 [02] Resources & Reversing Warmups
🔐 Cybersecurity
picoCTF 2018 [02] Resources & Reversing Warmups
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Security, Automation, and Exam Preparation
📚 Coursera Course ↗
Self-paced
Network Security, Automation, and Exam Preparation
Opens on Coursera ↗
Advanced Prometheus Alerting and Monitoring
📚 Coursera Course ↗
Self-paced
Advanced Prometheus Alerting and Monitoring
Opens on Coursera ↗
Physical Red Teaming
📚 Coursera Course ↗
Self-paced
Physical Red Teaming
Opens on Coursera ↗
Negotiation, Mediation, and Conflict Resolution - Capstone Project
📚 Coursera Course ↗
Self-paced
Negotiation, Mediation, and Conflict Resolution - Capstone Project
Opens on Coursera ↗
Understanding Cisco Cybersecurity Operations Fundamentals
📚 Coursera Course ↗
Self-paced
Understanding Cisco Cybersecurity Operations Fundamentals
Opens on Coursera ↗
Data Security
📚 Coursera Course ↗
Self-paced
Data Security
Opens on Coursera ↗