✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,442📚 Coursera 18,118🎤 TED 1
Python [sys] 07 Command-line Arguments
🔐 Cybersecurity
Python [sys] 07 Command-line Arguments
John Hammond Intermediate 13y ago
Python [sys] 06 Streams
🔐 Cybersecurity
Python [sys] 06 Streams
John Hammond Intermediate 13y ago
Python [sys] 05 Exit Codes
🔐 Cybersecurity
Python [sys] 05 Exit Codes
John Hammond Intermediate 13y ago
Python [sys] 04 Windows Version
🔐 Cybersecurity
Python [sys] 04 Windows Version
John Hammond Intermediate 13y ago
Python [sys] 03 Platform
🔐 Cybersecurity
Python [sys] 03 Platform
John Hammond Intermediate 13y ago
Python [sys] 02 Module Madness
🔐 Cybersecurity
Python [sys] 02 Module Madness
John Hammond Intermediate 13y ago
Python [sys] 01 Basic Information
🔐 Cybersecurity
Python [sys] 01 Basic Information
John Hammond Intermediate 13y ago
Batch 93 Ipconfig Command
🔐 Cybersecurity
Batch 93 Ipconfig Command
John Hammond Intermediate 13y ago
Batch 92 Nslookup Command
🔐 Cybersecurity
Batch 92 Nslookup Command
John Hammond Intermediate 13y ago
nullshell.com Forum!
🔐 Cybersecurity
nullshell.com Forum!
John Hammond Intermediate 13y ago
Batch 91 Custom Shell
🔐 Cybersecurity
Batch 91 Custom Shell
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
🔐 Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
🔐 Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
🔐 Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
🔐 Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
🔐 Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
🔐 Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
Batch 84 String Swapcase
🔐 Cybersecurity
Batch 84 String Swapcase
John Hammond Intermediate 13y ago
Batch 83 String to Upper
🔐 Cybersecurity
Batch 83 String to Upper
John Hammond Intermediate 13y ago
Batch 82 String to Lower
🔐 Cybersecurity
Batch 82 String to Lower
John Hammond Intermediate 13y ago
Batch 81 String Join
🔐 Cybersecurity
Batch 81 String Join
John Hammond Intermediate 13y ago
Batch 80 String is Upper
🔐 Cybersecurity
Batch 80 String is Upper
John Hammond Intermediate 13y ago
Batch 79 String is Full of Digits
🔐 Cybersecurity
Batch 79 String is Full of Digits
John Hammond Intermediate 13y ago
Batch 78 String is Lower
🔐 Cybersecurity
Batch 78 String is Lower
John Hammond Intermediate 13y ago
Batch 77 String is Alphabetical
🔐 Cybersecurity
Batch 77 String is Alphabetical
John Hammond Intermediate 13y ago
Batch 76 String Find
🔐 Cybersecurity
Batch 76 String Find
John Hammond Intermediate 13y ago
Batch 75 String Startswith and Endswith
🔐 Cybersecurity
Batch 75 String Startswith and Endswith
John Hammond Beginner 13y ago
Batch 73 String Count
🔐 Cybersecurity
Batch 73 String Count
John Hammond Intermediate 13y ago
Batch 72 String Capitalize
🔐 Cybersecurity
Batch 72 String Capitalize
John Hammond Intermediate 13y ago
Batch 54 Colormsg Script
🔐 Cybersecurity
Batch 54 Colormsg Script
John Hammond Intermediate 13y ago
Batch 71 String Center
🔐 Cybersecurity
Batch 71 String Center
John Hammond Intermediate 13y ago
Batch 70 Sort Function
🔐 Cybersecurity
Batch 70 Sort Function
John Hammond Intermediate 13y ago
Batch 69 Sum Function
🔐 Cybersecurity
Batch 69 Sum Function
John Hammond Intermediate 13y ago
Batch 68 Range Function
🔐 Cybersecurity
Batch 68 Range Function
John Hammond Intermediate 13y ago
Batch 67 Absolute Value Function
🔐 Cybersecurity
Batch 67 Absolute Value Function
John Hammond Intermediate 13y ago
Batch 66 Power Function
🔐 Cybersecurity
Batch 66 Power Function
John Hammond Intermediate 13y ago
Batch 65 Maximum Function
🔐 Cybersecurity
Batch 65 Maximum Function
John Hammond Intermediate 13y ago
Batch 64 Minimum Function
🔐 Cybersecurity
Batch 64 Minimum Function
John Hammond Intermediate 13y ago
Batch 63 Testing Delayed Variable Expansion
🔐 Cybersecurity
Batch 63 Testing Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 61 Building Arrays
🔐 Cybersecurity
Batch 61 Building Arrays
John Hammond Intermediate 13y ago
Batch 60 Modifying "Create String" Function
🔐 Cybersecurity
Batch 60 Modifying "Create String" Function
John Hammond Intermediate 13y ago
Batch 59 Continuing "Create String" Function
🔐 Cybersecurity
Batch 59 Continuing "Create String" Function
John Hammond Intermediate 13y ago
Batch 58 Building "Create String" Function
🔐 Cybersecurity
Batch 58 Building "Create String" Function
John Hammond Intermediate 13y ago
Batch 57 String Quotations
🔐 Cybersecurity
Batch 57 String Quotations
John Hammond Intermediate 13y ago
Batch 56 String Substitution
🔐 Cybersecurity
Batch 56 String Substitution
John Hammond Intermediate 13y ago
Batch 55 Substrings
🔐 Cybersecurity
Batch 55 Substrings
John Hammond Intermediate 13y ago
Batch 53 Changing the Prompt
🔐 Cybersecurity
Batch 53 Changing the Prompt
John Hammond Intermediate 13y ago
Batch 52 Command Prompt Properties
🔐 Cybersecurity
Batch 52 Command Prompt Properties
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Offensive Security Using Python
📚 Coursera Course ↗
Self-paced
Offensive Security Using Python
Opens on Coursera ↗
Ransomware Playbook - A Complete Guide for IT Professionals
📚 Coursera Course ↗
Self-paced
Ransomware Playbook - A Complete Guide for IT Professionals
Opens on Coursera ↗
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
📚 Coursera Course ↗
Self-paced
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
Opens on Coursera ↗
Practical Cyber Hacking Skills for Beginners
📚 Coursera Course ↗
Self-paced
Practical Cyber Hacking Skills for Beginners
Opens on Coursera ↗
Security Architecture & Operations
📚 Coursera Course ↗
Self-paced
Security Architecture & Operations
Opens on Coursera ↗
AWS: Resilient Solutions and Security Controls
📚 Coursera Course ↗
Self-paced
AWS: Resilient Solutions and Security Controls
Opens on Coursera ↗