✕ Clear filters
1,406 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,218📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
a new kind of Capture The Flag hacking
🔐 Cybersecurity
a new kind of Capture The Flag hacking
John Hammond Beginner 4mo ago
The State of Cybercrime in 2025 (with Nick Ascoli!)
🔐 Cybersecurity
The State of Cybercrime in 2025 (with Nick Ascoli!)
John Hammond Advanced 4mo ago
I Had Claude MCP Hack Me
🔐 Cybersecurity
I Had Claude MCP Hack Me
John Hammond Beginner 4mo ago
microsoft turned me down
🔐 Cybersecurity
microsoft turned me down
John Hammond Beginner 4mo ago
Lua Infostealer Analysis ("My Hawaii Vacation" CTF)
🔐 Cybersecurity
Lua Infostealer Analysis ("My Hawaii Vacation" CTF)
John Hammond Beginner 4mo ago
Window Batch Malware Analysis!
🔐 Cybersecurity
Window Batch Malware Analysis!
John Hammond Advanced 4mo ago
Fake DMCA MALWARE Scam
🔐 Cybersecurity
Fake DMCA MALWARE Scam
John Hammond Beginner 4mo ago
How Hackers Become Admin (they just ask)
🔐 Cybersecurity
How Hackers Become Admin (they just ask)
John Hammond Beginner 5mo ago
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
🔐 Cybersecurity
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
John Hammond Intermediate 5mo ago
Hackers Bruteforce Passwords to Microsoft Online
🔐 Cybersecurity
Hackers Bruteforce Passwords to Microsoft Online
John Hammond Intermediate 5mo ago
when you change your password, it's already stolen
🔐 Cybersecurity
when you change your password, it's already stolen
John Hammond Beginner 5mo ago
Learn Hardware Hacking!
🔐 Cybersecurity
Learn Hardware Hacking!
John Hammond Beginner 5mo ago
Script-Based Malware Analysis!
🔐 Cybersecurity
Script-Based Malware Analysis!
John Hammond Advanced 5mo ago
hacking copilot AI (with Tobias Diehl)
🔐 Cybersecurity
hacking copilot AI (with Tobias Diehl)
John Hammond Beginner 5mo ago
Regex for Hackers (with Python)
🔐 Cybersecurity
Regex for Hackers (with Python)
John Hammond Beginner 5mo ago
a hacker's new website
🔐 Cybersecurity
a hacker's new website
John Hammond Beginner 5mo ago
Learn API Hacking with InsiderPhD!
🔐 Cybersecurity
Learn API Hacking with InsiderPhD!
John Hammond Beginner 5mo ago
reverse engineering doesn't have to be hard
🔐 Cybersecurity
reverse engineering doesn't have to be hard
John Hammond Beginner 6mo ago
new capture the flag (hacking competition)
🔐 Cybersecurity
new capture the flag (hacking competition)
John Hammond Intermediate 6mo ago
Exploring the Dark Web
🔐 Cybersecurity
Exploring the Dark Web
John Hammond Beginner 6mo ago
Open Source SIEM and EDR Security
🔐 Cybersecurity
Open Source SIEM and EDR Security
John Hammond Beginner 6mo ago
ServiceUI.exe
🔐 Cybersecurity
ServiceUI.exe
John Hammond Beginner 6mo ago
Learn Python!
🔐 Cybersecurity
Learn Python!
John Hammond Beginner 6mo ago
6.pdf
🔐 Cybersecurity
6.pdf
John Hammond Beginner 6mo ago
LARGEST SUPPLY CHAIN HACK IN HISTORY ZOMG!!!!111
🔐 Cybersecurity
LARGEST SUPPLY CHAIN HACK IN HISTORY ZOMG!!!!111
John Hammond Beginner 6mo ago
Just Hacking Training - Windows Malware Development
🔐 Cybersecurity
Just Hacking Training - Windows Malware Development
John Hammond Beginner 6mo ago
Top 5 Ways You Get Hacked
🔐 Cybersecurity
Top 5 Ways You Get Hacked
John Hammond Beginner 6mo ago
it's just too easy
🔐 Cybersecurity
it's just too easy
John Hammond Beginner 6mo ago
The "Police" Scammed Us
🔐 Cybersecurity
The "Police" Scammed Us
John Hammond Beginner 7mo ago
hackers have gone TOO FAR
🔐 Cybersecurity
hackers have gone TOO FAR
John Hammond Advanced 7mo ago
The Entire Internet is Broken
🔐 Cybersecurity
The Entire Internet is Broken
John Hammond Advanced 7mo ago
Lesser Known Linux Persistence Mechanisms
🔐 Cybersecurity
Lesser Known Linux Persistence Mechanisms
John Hammond Beginner 7mo ago
hack Windows before even finishing setup
🔐 Cybersecurity
hack Windows before even finishing setup
John Hammond Beginner 7mo ago
this symbol is LYING TO YOU
🔐 Cybersecurity
this symbol is LYING TO YOU
John Hammond Beginner 7mo ago
BloodHound can map ANYTHING
🔐 Cybersecurity
BloodHound can map ANYTHING
John Hammond Beginner 7mo ago
i need your help.
🔐 Cybersecurity
i need your help.
John Hammond Beginner 7mo ago
how hackers hide (Intro to Beacon Object Files - with Empire C2!)
🔐 Cybersecurity
how hackers hide (Intro to Beacon Object Files - with Empire C2!)
John Hammond Beginner 8mo ago
how hackers avoid getting caught
🔐 Cybersecurity
how hackers avoid getting caught
John Hammond Beginner 8mo ago
Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)
🔐 Cybersecurity
Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)
John Hammond Beginner 8mo ago
this malware hides in a WALLPAPER
🔐 Cybersecurity
this malware hides in a WALLPAPER
John Hammond Advanced 9mo ago
hackers trick everyone to run malware (FileFix)
🔐 Cybersecurity
hackers trick everyone to run malware (FileFix)
John Hammond Beginner 9mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
🔐 Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 9mo ago
Learn Capture the Flag!
🔐 Cybersecurity
Learn Capture the Flag!
John Hammond Beginner 9mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
🔐 Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
🔐 Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 9mo ago
Learn Phishing!
🔐 Cybersecurity
Learn Phishing!
John Hammond Beginner 9mo ago
Hunting Phishing Kits
🔐 Cybersecurity
Hunting Phishing Kits
John Hammond Beginner 9mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
🔐 Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 9mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Security and Risk Management
📚 Coursera Course ↗
Self-paced
Security and Risk Management
Opens on Coursera ↗
Governance and Strategy
📚 Coursera Course ↗
Self-paced
Governance and Strategy
Opens on Coursera ↗
Practice Exam for ISC2 Certified in Cybersecurity (CC)
📚 Coursera Course ↗
Self-paced
Practice Exam for ISC2 Certified in Cybersecurity (CC)
Opens on Coursera ↗
Road to the CISO – Culminating Project Course
📚 Coursera Course ↗
Self-paced
Road to the CISO – Culminating Project Course
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
CISSP Domain 5: Identity and Access Management (IAM)
📚 Coursera Course ↗
Self-paced
CISSP Domain 5: Identity and Access Management (IAM)
Opens on Coursera ↗