✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,442📚 Coursera 18,118🎤 TED 1
Batch 51 Console Color
🔐 Cybersecurity
Batch 51 Console Color
John Hammond Intermediate 13y ago
Batch 50.5 Quick Output of File
🔐 Cybersecurity
Batch 50.5 Quick Output of File
John Hammond Intermediate 13y ago
Batch 50 Deleting Files
🔐 Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
🔐 Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
🔐 Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
🔐 Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
🔐 Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
🔐 Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 43 Intro to Redirection
🔐 Cybersecurity
Batch 43 Intro to Redirection
John Hammond Beginner 13y ago
Batch 42 Breakin' Outta the For Loop
🔐 Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
🔐 Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
🔐 Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
🔐 Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
🔐 Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
🔐 Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
🔐 Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
🔐 Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
🔐 Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
🔐 Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 33 For Loop Introduction
🔐 Cybersecurity
Batch 33 For Loop Introduction
John Hammond Beginner 13y ago
Batch 32 "While Loop"
🔐 Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
🔐 Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
🔐 Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
🔐 Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
🔐 Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
🔐 Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
🔐 Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
🔐 Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
🔐 Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
🔐 Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
🔐 Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
🔐 Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
🔐 Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
🔐 Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
🔐 Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
🔐 Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
🔐 Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
🔐 Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
🔐 Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
Batch 13 "Escape Characters"
🔐 Cybersecurity
Batch 13 "Escape Characters"
John Hammond Intermediate 13y ago
Batch 12 Echo Off
🔐 Cybersecurity
Batch 12 Echo Off
John Hammond Intermediate 13y ago
Batch 11 The @ Symbol
🔐 Cybersecurity
Batch 11 The @ Symbol
John Hammond Intermediate 13y ago
Batch 10 Parameter Help
🔐 Cybersecurity
Batch 10 Parameter Help
John Hammond Intermediate 13y ago
Batch 09 Command Arguments
🔐 Cybersecurity
Batch 09 Command Arguments
John Hammond Intermediate 13y ago
Batch 00 The Windows Command-Line
🔐 Cybersecurity
Batch 00 The Windows Command-Line
John Hammond Intermediate 13y ago
Batch 01 Commands
🔐 Cybersecurity
Batch 01 Commands
John Hammond Intermediate 13y ago
Batch 02 Data Types
🔐 Cybersecurity
Batch 02 Data Types
John Hammond Intermediate 13y ago
Batch 03 Variables
🔐 Cybersecurity
Batch 03 Variables
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Data Visualization & Advanced App Logic
📚 Coursera Course ↗
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera ↗
Foundations of Data Visualization
📚 Coursera Course ↗
Self-paced
Foundations of Data Visualization
Opens on Coursera ↗
A Detailed Guide to the OWASP Top 10
📚 Coursera Course ↗
Self-paced
A Detailed Guide to the OWASP Top 10
Opens on Coursera ↗
Hacking and Patching
📚 Coursera Course ↗
Self-paced
Hacking and Patching
Opens on Coursera ↗
Cybersecurity: Protecting your Information at Home
📚 Coursera Course ↗
Self-paced
Cybersecurity: Protecting your Information at Home
Opens on Coursera ↗
Fundamentals of Network Security and Cryptography
📚 Coursera Course ↗
Self-paced
Fundamentals of Network Security and Cryptography
Opens on Coursera ↗