✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
Enterprise security one step at a time
🔐 Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
🔐 Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
🔐 Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Microsoft Entra Training
🔐 Cybersecurity
Microsoft Entra Training
John Hammond Advanced 2y ago
Run this script with Eval
🔐 Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
🔐 Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
🔐 Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
🔐 Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
🔐 Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
Learning Entra ID (Azure Active Directory)
🔐 Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
🔐 Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
🔐 Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Technical Term Tips
🔐 Cybersecurity
Technical Term Tips
John Hammond Advanced 2y ago
Make Malware Analysis FASTER with Binary Emulation
🔐 Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
🔐 Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
🔐 Cybersecurity
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
🔐 Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
🔐 Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
🔐 Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
🔐 Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
🔐 Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
🔐 Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
🔐 Cybersecurity
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
i BACKDOORED a Desktop Shortcut (to run malware)
🔐 Cybersecurity
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond Advanced 2y ago
How to Hack Active Directory with ASREP Roasting
🔐 Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
Create Your Own File Extension
🔐 Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
How Hackers Move Through Networks (with Ligolo)
🔐 Cybersecurity
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
Hackers Steal Passwords & Personal Information
🔐 Cybersecurity
Hackers Steal Passwords & Personal Information
John Hammond Advanced 2y ago
I Put A Fake Email Server On The Internet
🔐 Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
This Windows Program can CLONE ITSELF
🔐 Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
This Company Got Hacked... but HOW?
🔐 Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
🔐 Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
I Hacked Another File Upload Website
🔐 Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
🔐 Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
Writing Custom Malware: Import Address Table Hooking
🔐 Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
How To Hack APIs with Python
🔐 Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
🔐 Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
🔐 Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Incident Response: Azure Log Analysis
🔐 Cybersecurity
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
🔐 Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Capture the Flag: Hacking Yet Another Markup Language
🔐 Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
🔐 Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
🔐 Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
🔐 Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
🔐 Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
🔐 Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
🔐 Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
🔐 Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cyber Risk Management Strategies
📚 Coursera Course ↗
Self-paced
Cyber Risk Management Strategies
Opens on Coursera ↗
Detecting and Mitigating Cyber Threats and Attacks
📚 Coursera Course ↗
Self-paced
Detecting and Mitigating Cyber Threats and Attacks
Opens on Coursera ↗
AWS: Network Security, Compliance and Governance
📚 Coursera Course ↗
Self-paced
AWS: Network Security, Compliance and Governance
Opens on Coursera ↗
A Detailed Guide to the OWASP Top 10
📚 Coursera Course ↗
Self-paced
A Detailed Guide to the OWASP Top 10
Opens on Coursera ↗
Application Security for Developers and DevOps Professionals
📚 Coursera Course ↗
Self-paced
Application Security for Developers and DevOps Professionals
Opens on Coursera ↗
Secure Against Network Intrusions
📚 Coursera Course ↗
Self-paced
Secure Against Network Intrusions
Opens on Coursera ↗