✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,538📚 Coursera 18,120🎤 TED 1
Python 32 Tuple Parameters
🔐 Cybersecurity
Python 32 Tuple Parameters
John Hammond Intermediate 14y ago
Python 31 Multiple Inheritance
🔐 Cybersecurity
Python 31 Multiple Inheritance
John Hammond Intermediate 14y ago
Python 30 Inheritance
🔐 Cybersecurity
Python 30 Inheritance
John Hammond Intermediate 14y ago
Python 29 Constructor Parameters
🔐 Cybersecurity
Python 29 Constructor Parameters
John Hammond Intermediate 14y ago
Python 28 Constructors and Deconstructors
🔐 Cybersecurity
Python 28 Constructors and Deconstructors
John Hammond Intermediate 14y ago
Python 27 Classes and Self
🔐 Cybersecurity
Python 27 Classes and Self
John Hammond Intermediate 14y ago
Python 26 Object Oriented Programming
🔐 Cybersecurity
Python 26 Object Oriented Programming
John Hammond Intermediate 14y ago
Python 25 Dictionaries
🔐 Cybersecurity
Python 25 Dictionaries
John Hammond Intermediate 14y ago
Python 24 Slicing Lists, Strings, and Tuples
🔐 Cybersecurity
Python 24 Slicing Lists, Strings, and Tuples
John Hammond Intermediate 14y ago
Python 23 List Assignment and Tuples
🔐 Cybersecurity
Python 23 List Assignment and Tuples
John Hammond Intermediate 14y ago
Python 01 Experimenting with IDLE
🔐 Cybersecurity
Python 01 Experimenting with IDLE
John Hammond Intermediate 14y ago
Python 22 Lists
🔐 Cybersecurity
Python 22 Lists
John Hammond Intermediate 14y ago
Python 21 Break and Continue
🔐 Cybersecurity
Python 21 Break and Continue
John Hammond Intermediate 14y ago
Python 20 For Loops
🔐 Cybersecurity
Python 20 For Loops
John Hammond Intermediate 14y ago
Python 19 While Loop
🔐 Cybersecurity
Python 19 While Loop
John Hammond Intermediate 14y ago
Python 18 Logical Operators
🔐 Cybersecurity
Python 18 Logical Operators
John Hammond Intermediate 14y ago
Python 17 Nesting
🔐 Cybersecurity
Python 17 Nesting
John Hammond Intermediate 14y ago
Python 16 Else and Elif
🔐 Cybersecurity
Python 16 Else and Elif
John Hammond Intermediate 14y ago
Python 15 Testing Operators
🔐 Cybersecurity
Python 15 Testing Operators
John Hammond Intermediate 14y ago
Python 14 If Statement
🔐 Cybersecurity
Python 14 If Statement
John Hammond Intermediate 14y ago
Python 13 Function Return
🔐 Cybersecurity
Python 13 Function Return
John Hammond Intermediate 14y ago
Python 12 Default Parameters
🔐 Cybersecurity
Python 12 Default Parameters
John Hammond Intermediate 14y ago
Python 11 Function Parameters
🔐 Cybersecurity
Python 11 Function Parameters
John Hammond Intermediate 14y ago
Python 10 Functions Scope
🔐 Cybersecurity
Python 10 Functions Scope
John Hammond Intermediate 14y ago
Python 09 Basic Functions
🔐 Cybersecurity
Python 09 Basic Functions
John Hammond Intermediate 14y ago
Python 08 Programming Style and Comments
🔐 Cybersecurity
Python 08 Programming Style and Comments
John Hammond Intermediate 14y ago
Python 07 Input and Output
🔐 Cybersecurity
Python 07 Input and Output
John Hammond Intermediate 14y ago
Python 06 Running Scripts
🔐 Cybersecurity
Python 06 Running Scripts
John Hammond Intermediate 14y ago
Python 05 Variables
🔐 Cybersecurity
Python 05 Variables
John Hammond Intermediate 14y ago
Python 04 Working With Strings
🔐 Cybersecurity
Python 04 Working With Strings
John Hammond Intermediate 14y ago
Python 03 Operating on Data
🔐 Cybersecurity
Python 03 Operating on Data
John Hammond Intermediate 14y ago
Python 02 Data Types
🔐 Cybersecurity
Python 02 Data Types
John Hammond Intermediate 14y ago
Python 75 List Reverse
🔐 Cybersecurity
Python 75 List Reverse
John Hammond Intermediate 14y ago
Sure has been a while!
🔐 Cybersecurity
Sure has been a while!
John Hammond Intermediate 14y ago
Fix dates with PHP?
🔐 Cybersecurity
Fix dates with PHP?
John Hammond Intermediate 14y ago
2012, Baby!
🔐 Cybersecurity
2012, Baby!
John Hammond Intermediate 14y ago
GM Shell, and Notes!
🔐 Cybersecurity
GM Shell, and Notes!
John Hammond Intermediate 14y ago
Christmas, Vacation and Python!
🔐 Cybersecurity
Christmas, Vacation and Python!
John Hammond Intermediate 14y ago
It's almost Christmas!
🔐 Cybersecurity
It's almost Christmas!
John Hammond Intermediate 14y ago
English Vocab, and More Python!
🔐 Cybersecurity
English Vocab, and More Python!
John Hammond Intermediate 14y ago
HTML, Net Shares, GML!
🔐 Cybersecurity
HTML, Net Shares, GML!
John Hammond Intermediate 14y ago
Python Experiments!
🔐 Cybersecurity
Python Experiments!
John Hammond Intermediate 14y ago
GML, OpenShot and Ubuntu 11.10!
🔐 Cybersecurity
GML, OpenShot and Ubuntu 11.10!
John Hammond Intermediate 14y ago
HTML Tables in Python!
🔐 Cybersecurity
HTML Tables in Python!
John Hammond Intermediate 14y ago
Finishing up Hamlet!
🔐 Cybersecurity
Finishing up Hamlet!
John Hammond Intermediate 14y ago
Writing Hamlet in PHP!
🔐 Cybersecurity
Writing Hamlet in PHP!
John Hammond Intermediate 14y ago
Having Fun is Hard Work!
🔐 Cybersecurity
Having Fun is Hard Work!
John Hammond Intermediate 14y ago
Just Another Code Commentary!
🔐 Cybersecurity
Just Another Code Commentary!
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Security Services in AWS
📚 Coursera Course ↗
Self-paced
Security Services in AWS
Opens on Coursera ↗
Emerging Telecom Technologies: Edge Security Focus
📚 Coursera Course ↗
Self-paced
Emerging Telecom Technologies: Edge Security Focus
Opens on Coursera ↗
Designing Robust Information System Security Architectures
📚 Coursera Course ↗
Self-paced
Designing Robust Information System Security Architectures
Opens on Coursera ↗
IP Addressing and Core Protocols
📚 Coursera Course ↗
Self-paced
IP Addressing and Core Protocols
Opens on Coursera ↗
Protection of Information Assets
📚 Coursera Course ↗
Self-paced
Protection of Information Assets
Opens on Coursera ↗
Computer Networks and Network Security
📚 Coursera Course ↗
Self-paced
Computer Networks and Network Security
Opens on Coursera ↗