✕ Clear filters
1,406 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,218📚 Coursera 18,118🎤 TED 1
Interactive SQL Injection
🔐 Cybersecurity
Interactive SQL Injection
John Hammond Beginner 1y ago
The Moment They Got Hacked
🔐 Cybersecurity
The Moment They Got Hacked
John Hammond Beginner 1y ago
Intro to Game Hacking: DEFCON 32
🔐 Cybersecurity
Intro to Game Hacking: DEFCON 32
John Hammond Beginner 1y ago
The Phishing Website that Hacked Linus Tech Tips
🔐 Cybersecurity
The Phishing Website that Hacked Linus Tech Tips
John Hammond Beginner 1y ago
He Passed CISSP At Age 23
🔐 Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
🔐 Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
Hacking a Docker Container Registry
🔐 Cybersecurity
Hacking a Docker Container Registry
John Hammond Beginner 1y ago
Permission to Hack You: Illicit Consent Grant Attack
🔐 Cybersecurity
Permission to Hack You: Illicit Consent Grant Attack
John Hammond Beginner 1y ago
Hacking Windows TrustedInstaller (GOD MODE)
🔐 Cybersecurity
Hacking Windows TrustedInstaller (GOD MODE)
John Hammond Beginner 1y ago
Speed Up Pentest Report Writing
🔐 Cybersecurity
Speed Up Pentest Report Writing
John Hammond Beginner 1y ago
Stop Scammers from Controlling Your Computer
🔐 Cybersecurity
Stop Scammers from Controlling Your Computer
John Hammond Beginner 1y ago
Stealing Computer Passwords on Login
🔐 Cybersecurity
Stealing Computer Passwords on Login
John Hammond Beginner 1y ago
FBI Stops World's Largest Botnet
🔐 Cybersecurity
FBI Stops World's Largest Botnet
John Hammond Beginner 1y ago
Fileless Malware Analysis & PowerShell Deobfuscation
🔐 Cybersecurity
Fileless Malware Analysis & PowerShell Deobfuscation
John Hammond Advanced 1y ago
Linux Hackers Become Root with CURL & Sudo
🔐 Cybersecurity
Linux Hackers Become Root with CURL & Sudo
John Hammond Beginner 1y ago
Hacking The Davinci Code: WebDAV Cybersecurity
🔐 Cybersecurity
Hacking The Davinci Code: WebDAV Cybersecurity
John Hammond Beginner 1y ago
Capture The Flag! NahamCon 2024 CTF Warmups
🔐 Cybersecurity
Capture The Flag! NahamCon 2024 CTF Warmups
John Hammond Beginner 1y ago
NahamCon 2024 CTF is LIVE Right Now
🔐 Cybersecurity
NahamCon 2024 CTF is LIVE Right Now
John Hammond Beginner 1y ago
I Put a Vulnerable Server on The Internet
🔐 Cybersecurity
I Put a Vulnerable Server on The Internet
John Hammond Beginner 1y ago
Discussing Active Directory & Internal Network Security
🔐 Cybersecurity
Discussing Active Directory & Internal Network Security
John Hammond Beginner 1y ago
Automated Cloud Security with ONE CLICK
🔐 Cybersecurity
Automated Cloud Security with ONE CLICK
John Hammond Beginner 1y ago
Yet Another Cybercrime Hacking Forum...
🔐 Cybersecurity
Yet Another Cybercrime Hacking Forum...
John Hammond Beginner 1y ago
Learn to Hack AWS & Cloud Security
🔐 Cybersecurity
Learn to Hack AWS & Cloud Security
John Hammond Beginner 1y ago
No Tools in a CTF
🔐 Cybersecurity
No Tools in a CTF
John Hammond Beginner 1y ago
Hackers Abuse Zero-Day Exploit for CrushFTP
🔐 Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 1y ago
Government Unveils Malware Analysis Tool, But...
🔐 Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 1y ago
Scraping Dark Web Sites with Python
🔐 Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 1y ago
How Hackers Can Hide PowerShell in Environment Variables
🔐 Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 1y ago
Malware & Cybersecurity Threats on the Horizon
🔐 Cybersecurity
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 1y ago
Hackers Hide with Clever Alternate Data Streams
🔐 Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 1y ago
Malware Analysis & Threat Intel: UAC Bypasses
🔐 Cybersecurity
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
How Hackers Compromise BIG Networks (with NetExec)
🔐 Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
🔐 Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
🔐 Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
Don't Use CyberChef. Use This Instead.
🔐 Cybersecurity
Don't Use CyberChef. Use This Instead.
John Hammond Advanced 2y ago
The Secrets of The Tor Browser
🔐 Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
🔐 Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
I Made Malware In Under 20 Minutes
🔐 Cybersecurity
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
Free Coding Tool Distributes Malware
🔐 Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Sweet New Threat Intel Just Dropped
🔐 Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Notepad.exe Will Snitch On You (full coding project)
🔐 Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
🔐 Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
🔐 Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
🔐 Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
Malware Analysis Made Easy: Cloud Investigations
🔐 Cybersecurity
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
🔐 Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
🔐 Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
🔐 Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Palo Alto Networks Cybersecurity Foundation
📚 Coursera Course ↗
Self-paced
Palo Alto Networks Cybersecurity Foundation
Opens on Coursera ↗
Hands-On Web App Pentesting
📚 Coursera Course ↗
Self-paced
Hands-On Web App Pentesting
Opens on Coursera ↗
Orchestrate, Analyze, and Evaluate AI Deployments
📚 Coursera Course ↗
Self-paced
Orchestrate, Analyze, and Evaluate AI Deployments
Opens on Coursera ↗
CISM: Incident Resilience & Recovery
📚 Coursera Course ↗
Self-paced
CISM: Incident Resilience & Recovery
Opens on Coursera ↗
OWASP Top 10
📚 Coursera Course ↗
Self-paced
OWASP Top 10
Opens on Coursera ↗
Python Cryptography: Build & Explore Classical Ciphers
📚 Coursera Course ↗
Self-paced
Python Cryptography: Build & Explore Classical Ciphers
Opens on Coursera ↗