✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
How Hackers Hide From Memory Scanners
🔐 Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
they're selling WHAT on Telegram?!?
🔐 Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
ChatGPT Learns the Rust Programming Language
🔐 Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
I Stole a Microsoft 365 Account. Here's How.
🔐 Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
🔐 Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
🔐 Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
🔐 Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
🔐 Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
🔐 Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
🔐 Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
🔐 Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
🔐 Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
🔐 Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Create Your Own Dark Web Website
🔐 Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
Website Vulnerabilities to Fully Hacked Server
🔐 Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
🔐 Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
How Hackers Exploit Vulnerable Drivers
🔐 Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
🔐 Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
VULNERABLE Kernel Drivers for Security Research
🔐 Cybersecurity
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
New "Dark Web" Generative AI Chatbots?!
🔐 Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Exploring the Latest Malware Samples
🔐 Cybersecurity
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
I Explored Ransomware Cybercrime on the Dark Web
🔐 Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
How To Pivot Through a Network with Chisel
🔐 Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
🔐 Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
Learn Active Directory Kerberoasting
🔐 Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Your Computer could be For Sale on the Dark Web
🔐 Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
Not All ZIP Files Are Equal
🔐 Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
🔐 Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Telegram Cybercrime is INSANE
🔐 Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Zimbra ZCS 0-day Exploited In The Wild
🔐 Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
"Please Hack My Computer"
🔐 Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
🔐 Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
🔐 Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
🔐 Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
🔐 Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
🔐 Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
🔐 Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
🔐 Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
🔐 Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
🔐 Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
🔐 Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
🔐 Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
Hacking Complex Passwords with Rules & Munging
🔐 Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
🔐 Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
How To Test Your Security with Atomic Red Team
🔐 Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
winget: Install ROGUE Software & Packages?
🔐 Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
What SECRETS are in your Clipboard?
🔐 Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
🔐 Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Hacking Foundations
📚 Coursera Course ↗
Self-paced
Ethical Hacking Foundations
Opens on Coursera ↗
Threat Hunting Techniques
📚 Coursera Course ↗
Self-paced
Threat Hunting Techniques
Opens on Coursera ↗
Cloud Security Basics
📚 Coursera Course ↗
Self-paced
Cloud Security Basics
Opens on Coursera ↗
Cyber Secure Coder (CSC-110)
📚 Coursera Course ↗
Self-paced
Cyber Secure Coder (CSC-110)
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
Play It Safe: Manage Security Risks
📚 Coursera Course ↗
Self-paced
Play It Safe: Manage Security Risks
Opens on Coursera ↗