✕ Clear filters
1,406 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,218📚 Coursera 18,118🎤 TED 1
Detection Engineering with Wazuh
🔐 Cybersecurity
Detection Engineering with Wazuh
John Hammond Beginner 1y ago
The State of Cybercrime [2024]
🔐 Cybersecurity
The State of Cybercrime [2024]
John Hammond Beginner 1y ago
BLOB Based Phishing Scams
🔐 Cybersecurity
BLOB Based Phishing Scams
John Hammond Beginner 1y ago
Learn Active Directory!
🔐 Cybersecurity
Learn Active Directory!
John Hammond Beginner 1y ago
Godot Game Used As Malware
🔐 Cybersecurity
Godot Game Used As Malware
John Hammond Advanced 1y ago
Spying on Scammers
🔐 Cybersecurity
Spying on Scammers
John Hammond Beginner 1y ago
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
🔐 Cybersecurity
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
John Hammond Beginner 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
🔐 Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
🔐 Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
🔐 Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
🔐 Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
I Stole My Own Reddit Account. Here's How.
🔐 Cybersecurity
I Stole My Own Reddit Account. Here's How.
John Hammond Beginner 1y ago
Learn Cryptography!
🔐 Cybersecurity
Learn Cryptography!
John Hammond Beginner 1y ago
Linux Challenges for Holiday Hacking
🔐 Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
🔐 Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
Capture the Flag! Command Injection by Docker Layers
🔐 Cybersecurity
Capture the Flag! Command Injection by Docker Layers
John Hammond Beginner 1y ago
From Novice to Pro: Unleashing Hacking Genius
🔐 Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
🔐 Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
🔐 Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
🔐 Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
🔐 Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
🔐 Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
🔐 Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
World Building for SANS Holiday Hack Challenge
🔐 Cybersecurity
World Building for SANS Holiday Hack Challenge
John Hammond Beginner 1y ago
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
🔐 Cybersecurity
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
John Hammond Beginner 1y ago
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
🔐 Cybersecurity
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
John Hammond Beginner 1y ago
How Hackers Persist & Privesc in Microsoft 365
🔐 Cybersecurity
How Hackers Persist & Privesc in Microsoft 365
John Hammond Beginner 1y ago
Learn Open-Source Intelligence (OSINT)!
🔐 Cybersecurity
Learn Open-Source Intelligence (OSINT)!
John Hammond Beginner 1y ago
Holiday Hack Challenge   Ed Skoudis Interview
🔐 Cybersecurity
Holiday Hack Challenge Ed Skoudis Interview
John Hammond Beginner 1y ago
Exploring the Wiz Cloud Security Platform
🔐 Cybersecurity
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
🔐 Cybersecurity
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Hackers Abuse MeshCentral for a RAT
🔐 Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
Bruteforcing Windows Defender Exclusions
🔐 Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
REAL Ransomware Chat Logs
🔐 Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
Github Intentionally Lets You Read Deleted & Private Commits
🔐 Cybersecurity
Github Intentionally Lets You Read Deleted & Private Commits
John Hammond Beginner 1y ago
Three Ways to Hack Mobile Apps
🔐 Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
They Say This Malware is INSANE
🔐 Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
🔐 Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Where Does Malware Go On Your Computer?
🔐 Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
🔐 Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
🔐 Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
How to Scrape Telegram with Python
🔐 Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
🔐 Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
🔐 Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
The Hacker with Hardware Implants (interview)
🔐 Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
Hacking Games with MelonLoader
🔐 Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
I Can't Scan This Website
🔐 Cybersecurity
I Can't Scan This Website
John Hammond Beginner 1y ago
Unity Game Hacking with dnSpy
🔐 Cybersecurity
Unity Game Hacking with dnSpy
John Hammond Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Security-Driven Software Development
📚 Coursera Course ↗
Self-paced
Security-Driven Software Development
Opens on Coursera ↗
Understanding Cyber Risk Reporting with FAIR™
📚 Coursera Course ↗
Self-paced
Understanding Cyber Risk Reporting with FAIR™
Opens on Coursera ↗
Network Systems Foundations
📚 Coursera Course ↗
Self-paced
Network Systems Foundations
Opens on Coursera ↗
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
Ethical Hacking Fundamentals
📚 Coursera Course ↗
Self-paced
Ethical Hacking Fundamentals
Opens on Coursera ↗
Digital Marketing Trends
📚 Coursera Course ↗
Self-paced
Digital Marketing Trends
Opens on Coursera ↗