✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,538📚 Coursera 18,120🎤 TED 1
Batch 04 Environment Variables
🔐 Cybersecurity
Batch 04 Environment Variables
John Hammond Intermediate 13y ago
Batch 05 String "Concatenation"
🔐 Cybersecurity
Batch 05 String "Concatenation"
John Hammond Intermediate 13y ago
Batch 06 Scripts
🔐 Cybersecurity
Batch 06 Scripts
John Hammond Intermediate 13y ago
Batch 07 Notepad to Notepad++
🔐 Cybersecurity
Batch 07 Notepad to Notepad++
John Hammond Intermediate 13y ago
Batch 08 Output with Echo
🔐 Cybersecurity
Batch 08 Output with Echo
John Hammond Intermediate 13y ago
Source SDK Maps, what?
🔐 Cybersecurity
Source SDK Maps, what?
John Hammond Intermediate 14y ago
Python 74 List Remove
🔐 Cybersecurity
Python 74 List Remove
John Hammond Intermediate 14y ago
Python 73 List Insert
🔐 Cybersecurity
Python 73 List Insert
John Hammond Intermediate 14y ago
Python 72 List Index
🔐 Cybersecurity
Python 72 List Index
John Hammond Intermediate 14y ago
Python 71 List Count
🔐 Cybersecurity
Python 71 List Count
John Hammond Intermediate 14y ago
Python 70 List Append
🔐 Cybersecurity
Python 70 List Append
John Hammond Intermediate 14y ago
Python 69 String zfill
🔐 Cybersecurity
Python 69 String zfill
John Hammond Intermediate 14y ago
Python 68 String To Upper
🔐 Cybersecurity
Python 68 String To Upper
John Hammond Intermediate 14y ago
Python 67 String Swapcase
🔐 Cybersecurity
Python 67 String Swapcase
John Hammond Intermediate 14y ago
Python 66 String Split Lines
🔐 Cybersecurity
Python 66 String Split Lines
John Hammond Intermediate 14y ago
Python 64 String Right Strip
🔐 Cybersecurity
Python 64 String Right Strip
John Hammond Intermediate 14y ago
Python 65 String Split
🔐 Cybersecurity
Python 65 String Split
John Hammond Intermediate 14y ago
Python 63 String Right Justify
🔐 Cybersecurity
Python 63 String Right Justify
John Hammond Intermediate 14y ago
Python 62 String Right Find
🔐 Cybersecurity
Python 62 String Right Find
John Hammond Intermediate 14y ago
Python 61 String Replace
🔐 Cybersecurity
Python 61 String Replace
John Hammond Intermediate 14y ago
Python 60 String Left Strip
🔐 Cybersecurity
Python 60 String Left Strip
John Hammond Intermediate 14y ago
Python 59 String to Lowercase
🔐 Cybersecurity
Python 59 String to Lowercase
John Hammond Intermediate 14y ago
Python 58 String Left Justify
🔐 Cybersecurity
Python 58 String Left Justify
John Hammond Intermediate 14y ago
Python 57 String Join
🔐 Cybersecurity
Python 57 String Join
John Hammond Intermediate 14y ago
Python 56 String is Space
🔐 Cybersecurity
Python 56 String is Space
John Hammond Intermediate 14y ago
Python 55 String Is Uppercase
🔐 Cybersecurity
Python 55 String Is Uppercase
John Hammond Intermediate 14y ago
Python 54 String is Lowercase
🔐 Cybersecurity
Python 54 String is Lowercase
John Hammond Intermediate 14y ago
Python 53 String is Full of Digits
🔐 Cybersecurity
Python 53 String is Full of Digits
John Hammond Intermediate 14y ago
Python 52 String is Alphabetical
🔐 Cybersecurity
Python 52 String is Alphabetical
John Hammond Intermediate 14y ago
Python 51 String Find
🔐 Cybersecurity
Python 51 String Find
John Hammond Intermediate 14y ago
Python 50 String Startswith and Endswith
🔐 Cybersecurity
Python 50 String Startswith and Endswith
John Hammond Beginner 14y ago
Python 49 String Count
🔐 Cybersecurity
Python 49 String Count
John Hammond Intermediate 14y ago
Python 48 String Center
🔐 Cybersecurity
Python 48 String Center
John Hammond Intermediate 14y ago
Python 47 String Capitalize
🔐 Cybersecurity
Python 47 String Capitalize
John Hammond Intermediate 14y ago
Python 46 Sorted Function
🔐 Cybersecurity
Python 46 Sorted Function
John Hammond Intermediate 14y ago
Python 45 Sum Function
🔐 Cybersecurity
Python 45 Sum Function
John Hammond Intermediate 14y ago
Python 44 Range Function
🔐 Cybersecurity
Python 44 Range Function
John Hammond Intermediate 14y ago
Python 43 Absolute Value Function
🔐 Cybersecurity
Python 43 Absolute Value Function
John Hammond Intermediate 14y ago
Python 42 Power Function
🔐 Cybersecurity
Python 42 Power Function
John Hammond Intermediate 14y ago
Python 41 Maximum Value
🔐 Cybersecurity
Python 41 Maximum Value
John Hammond Intermediate 14y ago
Python 40 Minimum Value
🔐 Cybersecurity
Python 40 Minimum Value
John Hammond Intermediate 14y ago
Python 39 Multiple Lengths
🔐 Cybersecurity
Python 39 Multiple Lengths
John Hammond Intermediate 14y ago
Python 38 Getting Length
🔐 Cybersecurity
Python 38 Getting Length
John Hammond Intermediate 14y ago
Python 37 Getting Help
🔐 Cybersecurity
Python 37 Getting Help
John Hammond Intermediate 14y ago
Python 36 Modules
🔐 Cybersecurity
Python 36 Modules
John Hammond Intermediate 14y ago
Python 35 Reading From Files
🔐 Cybersecurity
Python 35 Reading From Files
John Hammond Intermediate 14y ago
Python 34 Writing To Files
🔐 Cybersecurity
Python 34 Writing To Files
John Hammond Intermediate 14y ago
Python 33 Dictionary Parameters
🔐 Cybersecurity
Python 33 Dictionary Parameters
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Kaizen Event: Become a Certified Kaizen Event Specialist
📚 Coursera Course ↗
Self-paced
Kaizen Event: Become a Certified Kaizen Event Specialist
Opens on Coursera ↗
Consultative Selling and Buyer Engagement
📚 Coursera Course ↗
Self-paced
Consultative Selling and Buyer Engagement
Opens on Coursera ↗
Cybersecurity Tools and Technologies
📚 Coursera Course ↗
Self-paced
Cybersecurity Tools and Technologies
Opens on Coursera ↗
Introducción a Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introducción a Cloud Next Generation Firewall
Opens on Coursera ↗
 System Hacking, Malware Threats, and Network Attacks
📚 Coursera Course ↗
Self-paced
System Hacking, Malware Threats, and Network Attacks
Opens on Coursera ↗
Ethical Hacking Fundamentals
📚 Coursera Course ↗
Self-paced
Ethical Hacking Fundamentals
Opens on Coursera ↗