✕ Clear filters
2,557 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 197,921📚 Coursera 18,103🏛 Archive.org 35🎤 TED 1
Using History API to Animate URL and hmm what else?
🔐 Cybersecurity
Using History API to Animate URL and hmm what else?
Hussein Nasser Intermediate 5y ago
Cisco Packet Tracer Tips | Free CCNA 200-301 Course | Video #11
🔐 Cybersecurity
Cisco Packet Tracer Tips | Free CCNA 200-301 Course | Video #11
David Bombal Intermediate 5y ago
Nmap - MySQL Enumeration
🔐 Cybersecurity
Nmap - MySQL Enumeration
HackerSploit Intermediate 5y ago
Nmap - SMB Enumeration
🔐 Cybersecurity
Nmap - SMB Enumeration
HackerSploit Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
🔐 Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
A Machine Learning Primer for the Blue Team
🔐 Cybersecurity
A Machine Learning Primer for the Blue Team
SANS Institute Intermediate 5y ago
HackTheBox - Fatty
🔐 Cybersecurity
HackTheBox - Fatty
IppSec Intermediate 5y ago
Your Backend is Also a Frontend (Backend vs Frontend Engineering)
🔐 Cybersecurity
Your Backend is Also a Frontend (Backend vs Frontend Engineering)
Hussein Nasser Intermediate 5y ago
Protocol Wars!  | Free CCNA 200-301 Course | Video #9
🔐 Cybersecurity
Protocol Wars! | Free CCNA 200-301 Course | Video #9
David Bombal Intermediate 5y ago
HackTheBox - Oouch
🔐 Cybersecurity
HackTheBox - Oouch
IppSec Intermediate 5y ago
NetworkChuck Coffee
🔐 Cybersecurity
NetworkChuck Coffee
NetworkChuck Intermediate 5y ago
VLC Kill Bill: Easter Egg Reverse Engineering
🔐 Cybersecurity
VLC Kill Bill: Easter Egg Reverse Engineering
LiveOverflow Intermediate 5y ago
Capture the Flag? Change Your Life
🔐 Cybersecurity
Capture the Flag? Change Your Life
John Hammond Intermediate 5y ago
what am i doing?? (aws...security+.....ccna?)
🔐 Cybersecurity
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
Nmap - HTTP Enumeration - WAF Detection And Fingerprinting
🔐 Cybersecurity
Nmap - HTTP Enumeration - WAF Detection And Fingerprinting
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - Finding Hidden Files And Directories
🔐 Cybersecurity
Nmap - HTTP Enumeration - Finding Hidden Files And Directories
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - Detecting HTTP Methods
🔐 Cybersecurity
Nmap - HTTP Enumeration - Detecting HTTP Methods
HackerSploit Intermediate 5y ago
Nmap - SMTP Enumeration
🔐 Cybersecurity
Nmap - SMTP Enumeration
HackerSploit Intermediate 5y ago
Nmap - DNS Enumeration
🔐 Cybersecurity
Nmap - DNS Enumeration
HackerSploit Intermediate 5y ago
Nmap - FTP Enumeration
🔐 Cybersecurity
Nmap - FTP Enumeration
HackerSploit Intermediate 5y ago
Nmap - Banner Grabbing
🔐 Cybersecurity
Nmap - Banner Grabbing
HackerSploit Intermediate 5y ago
Nmap - NSE Syntax
🔐 Cybersecurity
Nmap - NSE Syntax
HackerSploit Intermediate 5y ago
Nmap - Scan Timing And Performance
🔐 Cybersecurity
Nmap - Scan Timing And Performance
HackerSploit Intermediate 5y ago
MongoDB and ElasticSearch Clusters WIPED! The Meow attack and how Backend Engineers can prevent it
🔐 Cybersecurity
MongoDB and ElasticSearch Clusters WIPED! The Meow attack and how Backend Engineers can prevent it
Hussein Nasser Intermediate 5y ago
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
🔐 Cybersecurity
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
HackerSploit Intermediate 5y ago
Wiresharking Server-Sent Events
🔐 Cybersecurity
Wiresharking Server-Sent Events
Hussein Nasser Intermediate 5y ago
Remote Code Execution bug found in Popular Node.js changelog library (I go through the code)
🔐 Cybersecurity
Remote Code Execution bug found in Popular Node.js changelog library (I go through the code)
Hussein Nasser Intermediate 5y ago
My Thoughts on the Massive VPN Leak of 1.2 TB User logs
🔐 Cybersecurity
My Thoughts on the Massive VPN Leak of 1.2 TB User logs
Hussein Nasser Intermediate 5y ago
Digicert revokes 50,000 EV Certificates
🔐 Cybersecurity
Digicert revokes 50,000 EV Certificates
Hussein Nasser Intermediate 5y ago
The Cloudflare Outage - What Happened? And my Thoughts
🔐 Cybersecurity
The Cloudflare Outage - What Happened? And my Thoughts
Hussein Nasser Intermediate 5y ago
Introduction To Pentesting - Enumeration
🔐 Cybersecurity
Introduction To Pentesting - Enumeration
HackerSploit Intermediate 5y ago
My Thoughts on The Twitter “Hack”
🔐 Cybersecurity
My Thoughts on The Twitter “Hack”
Hussein Nasser Intermediate 5y ago
How To Reset Linux Root Password
🔐 Cybersecurity
How To Reset Linux Root Password
HackerSploit Intermediate 5y ago
Understanding and Applying Threat Intelligence
🔐 Cybersecurity
Understanding and Applying Threat Intelligence
SANS Institute Intermediate 5y ago
A Database User for each REST Route - Best Practices for Backend Application with Postgres
🔐 Cybersecurity
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Hussein Nasser Intermediate 5y ago
Building a Deno HTTPS Web Server with Self-Signed Certificate
🔐 Cybersecurity
Building a Deno HTTPS Web Server with Self-Signed Certificate
Hussein Nasser Intermediate 5y ago
How To Convert Linux Packages With Alien
🔐 Cybersecurity
How To Convert Linux Packages With Alien
HackerSploit Intermediate 5y ago
How much can you learn about the Backend from its API?
🔐 Cybersecurity
How much can you learn about the Backend from its API?
Hussein Nasser Intermediate 5y ago
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
🔐 Cybersecurity
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Hussein Nasser Intermediate 5y ago
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
🔐 Cybersecurity
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Hussein Nasser Intermediate 5y ago
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
🔐 Cybersecurity
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Hussein Nasser Intermediate 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
🔐 Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
🔐 Cybersecurity
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
HackTheBox Walkthrough - Tenten
🔐 Cybersecurity
HackTheBox Walkthrough - Tenten
HackerSploit Intermediate 5y ago
HackTheBox Walkthrough - Optimum
🔐 Cybersecurity
HackTheBox Walkthrough - Optimum
HackerSploit Intermediate 5y ago
Shock to the System: Re-Evaluating Your Security Operations
🔐 Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
🔐 Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
🔐 Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Network Services, Security, and Programmability
📚 Coursera Course ↗
Self-paced
Advanced Network Services, Security, and Programmability
Opens on Coursera ↗
Foundations of Site Reliability Engineering Training
📚 Coursera Course ↗
Self-paced
Foundations of Site Reliability Engineering Training
Opens on Coursera ↗
Incident Response and Risk Management
📚 Coursera Course ↗
Self-paced
Incident Response and Risk Management
Opens on Coursera ↗
Hands-on Hacking
📚 Coursera Course ↗
Self-paced
Hands-on Hacking
Opens on Coursera ↗
Palo Alto Networks Cybersecurity Fundamentals
📚 Coursera Course ↗
Self-paced
Palo Alto Networks Cybersecurity Fundamentals
Opens on Coursera ↗
Advanced Security Architecture
📚 Coursera Course ↗
Self-paced
Advanced Security Architecture
Opens on Coursera ↗