✕ Clear filters
2,559 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,218📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
Linux Essentials For Hackers - #5 - File & Directory Ownership
🔐 Cybersecurity
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
🔐 Cybersecurity
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
Do you REALLY need a VPN?
🔐 Cybersecurity
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
PicoCTF 2019 [13] More Client-Side & Flags
🔐 Cybersecurity
PicoCTF 2019 [13] More Client-Side & Flags
John Hammond Intermediate 6y ago
PicoCTF 2019 [12] Shark On Wire 1
🔐 Cybersecurity
PicoCTF 2019 [12] Shark On Wire 1
John Hammond Intermediate 6y ago
Security Awareness Recognition Program | SANS Security Awareness Summit
🔐 Cybersecurity
Security Awareness Recognition Program | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
How to Build Your Own Escape Room | SANS Security Awareness Summit
🔐 Cybersecurity
How to Build Your Own Escape Room | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
HackTheBox - Safe
🔐 Cybersecurity
HackTheBox - Safe
IppSec Intermediate 6y ago
HackTheBox - Ellingson
🔐 Cybersecurity
HackTheBox - Ellingson
IppSec Intermediate 6y ago
10x Engineer: What? You can do this on Cisco IOS?
🔐 Cybersecurity
10x Engineer: What? You can do this on Cisco IOS?
David Bombal Intermediate 6y ago
GNS3: Docker containers vs Virtual Machines
🔐 Cybersecurity
GNS3: Docker containers vs Virtual Machines
David Bombal Intermediate 6y ago
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
🔐 Cybersecurity
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor Intermediate 6y ago
Oncology Acupuncture VT 2019 Testimonials 2
🔐 Cybersecurity
Oncology Acupuncture VT 2019 Testimonials 2
TCM Academy Intermediate 6y ago
How Speedrunners Use Game Hacking Tools
🔐 Cybersecurity
How Speedrunners Use Game Hacking Tools
LiveOverflow Intermediate 6y ago
The TOP 3 uses for a Raspberry Pi!!
🔐 Cybersecurity
The TOP 3 uses for a Raspberry Pi!!
NetworkChuck Intermediate 6y ago
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
🔐 Cybersecurity
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Computerphile Intermediate 6y ago
Linux Essentials For Hackers - #3 - File Management & Manipulation
🔐 Cybersecurity
Linux Essentials For Hackers - #3 - File Management & Manipulation
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
🔐 Cybersecurity
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
HackerSploit Intermediate 6y ago
PicoCTF 2019 [11] What Lies Within & Extensions
🔐 Cybersecurity
PicoCTF 2019 [11] What Lies Within & Extensions
John Hammond Intermediate 6y ago
What sets SANS apart from other cyber security training providers
🔐 Cybersecurity
What sets SANS apart from other cyber security training providers
SANS Institute Intermediate 6y ago
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
🔐 Cybersecurity
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
PicoCTF 2019 [10] Robots.txt & Metadata
🔐 Cybersecurity
PicoCTF 2019 [10] Robots.txt & Metadata
John Hammond Intermediate 6y ago
PicoCTF 2019 [09] Logon & Vaultdoor 1
🔐 Cybersecurity
PicoCTF 2019 [09] Logon & Vaultdoor 1
John Hammond Intermediate 6y ago
PicoCTF 2019 [08] Caesar & Client Side
🔐 Cybersecurity
PicoCTF 2019 [08] Caesar & Client Side
John Hammond Intermediate 6y ago
PicoCTF 2019 [07] Unzip, RE & Rot13
🔐 Cybersecurity
PicoCTF 2019 [07] Unzip, RE & Rot13
John Hammond Intermediate 6y ago
Cybertalk - EP1 -  Secure Coding, HackTheBox & Web App Penetration Testing
🔐 Cybersecurity
Cybertalk - EP1 - Secure Coding, HackTheBox & Web App Penetration Testing
HackerSploit Intermediate 6y ago
PicoCTF 2019 [06] Practice Run & SSH
🔐 Cybersecurity
PicoCTF 2019 [06] Practice Run & SSH
John Hammond Intermediate 6y ago
PicoCTF 2019 [05] Handy Shellcode (Pwntools)
🔐 Cybersecurity
PicoCTF 2019 [05] Handy Shellcode (Pwntools)
John Hammond Intermediate 6y ago
PicoCTF 2019 [04] Warmed Up + Bash Script
🔐 Cybersecurity
PicoCTF 2019 [04] Warmed Up + Bash Script
John Hammond Intermediate 6y ago
PicoCTF 2019 [03] The Numbers (Python Script)
🔐 Cybersecurity
PicoCTF 2019 [03] The Numbers (Python Script)
John Hammond Intermediate 6y ago
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
🔐 Cybersecurity
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
John Hammond Intermediate 6y ago
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
🔐 Cybersecurity
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
HackerSploit Intermediate 6y ago
PicoCTF 2019 [01] Glory of the Garden (Strings Challenge)
🔐 Cybersecurity
PicoCTF 2019 [01] Glory of the Garden (Strings Challenge)
John Hammond Intermediate 6y ago
OSCP - Taking Notes & Resources
🔐 Cybersecurity
OSCP - Taking Notes & Resources
John Hammond Intermediate 6y ago
Python3 For Pentesting - Developing A Banner Grabbing Script
🔐 Cybersecurity
Python3 For Pentesting - Developing A Banner Grabbing Script
HackerSploit Intermediate 6y ago
How To Upgrade Linux Kernel On Ubuntu
🔐 Cybersecurity
How To Upgrade Linux Kernel On Ubuntu
HackerSploit Intermediate 6y ago
PicoCTF 2019 HYPE - LIVE NOW!
🔐 Cybersecurity
PicoCTF 2019 HYPE - LIVE NOW!
John Hammond Intermediate 6y ago
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
🔐 Cybersecurity
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
John Hammond Intermediate 6y ago
100% OSCP: Offensive Security Certified Professional
🔐 Cybersecurity
100% OSCP: Offensive Security Certified Professional
John Hammond Intermediate 6y ago
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
🔐 Cybersecurity
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
🔐 Cybersecurity
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
Kioptrix 1.1 Walkthrough - Boot-To-Root
🔐 Cybersecurity
Kioptrix 1.1 Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
🔐 Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Visio Alternative? GNS3 interactive topology diagrams
🔐 Cybersecurity
Visio Alternative? GNS3 interactive topology diagrams
David Bombal Intermediate 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
🔐 Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
HACKERS REACT: Bad Hollywood Hacking Scenes
🔐 Cybersecurity
HACKERS REACT: Bad Hollywood Hacking Scenes
John Hammond Intermediate 6y ago
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
🔐 Cybersecurity
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
SANS Institute Intermediate 6y ago
How To Install VMware Tools On BlackArch Linux
🔐 Cybersecurity
How To Install VMware Tools On BlackArch Linux
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Microsoft Cybersecurity Architect Exam Ref SC-100
📚 Coursera Course ↗
Self-paced
Microsoft Cybersecurity Architect Exam Ref SC-100
Opens on Coursera ↗
Number Theory and Cryptography
📚 Coursera Course ↗
Self-paced
Number Theory and Cryptography
Opens on Coursera ↗
Linux Security Techniques
📚 Coursera Course ↗
Self-paced
Linux Security Techniques
Opens on Coursera ↗
Cybersecurity Essentials - From Zero to Secure
📚 Coursera Course ↗
Self-paced
Cybersecurity Essentials - From Zero to Secure
Opens on Coursera ↗
Fortify Confluence Security
📚 Coursera Course ↗
Self-paced
Fortify Confluence Security
Opens on Coursera ↗
Offensive Hacking Unfolded - Become a Pro Pentester
📚 Coursera Course ↗
Self-paced
Offensive Hacking Unfolded - Become a Pro Pentester
Opens on Coursera ↗