✕ Clear filters
2,558 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,400📚 Coursera 18,118🎤 TED 1
Python [zipfile] 01 Creating a .ZIP File
🔐 Cybersecurity
Python [zipfile] 01 Creating a .ZIP File
John Hammond Intermediate 12y ago
Python [gtk] 04 Window Title and Buttons
🔐 Cybersecurity
Python [gtk] 04 Window Title and Buttons
John Hammond Intermediate 12y ago
Behind the Great Firewall of China - Michael Anti
🔐 Cybersecurity
Behind the Great Firewall of China - Michael Anti
TED-Ed Intermediate 12y ago
Python [gtk] 03 Window Sizes and Position
🔐 Cybersecurity
Python [gtk] 03 Window Sizes and Position
John Hammond Intermediate 12y ago
Python [gtk] 02 Expanding Our Signal Function
🔐 Cybersecurity
Python [gtk] 02 Expanding Our Signal Function
John Hammond Intermediate 12y ago
Where the heck have I been?
🔐 Cybersecurity
Where the heck have I been?
John Hammond Intermediate 12y ago
Python [gtk] 01 Basic Window
🔐 Cybersecurity
Python [gtk] 01 Basic Window
John Hammond Intermediate 12y ago
Fail.
🔐 Cybersecurity
Fail.
John Hammond Intermediate 12y ago
Python [curses] 19 Unicurses/Curses No Background Check
🔐 Cybersecurity
Python [curses] 19 Unicurses/Curses No Background Check
John Hammond Intermediate 12y ago
How To Use The Internet
🔐 Cybersecurity
How To Use The Internet
John Hammond Intermediate 12y ago
Python [curses] 00 Installing Unicurses on Windows
🔐 Cybersecurity
Python [curses] 00 Installing Unicurses on Windows
John Hammond Intermediate 12y ago
Python [curses] 18 Background Fix
🔐 Cybersecurity
Python [curses] 18 Background Fix
John Hammond Intermediate 12y ago
Python [curses] 17 "Rooms"
🔐 Cybersecurity
Python [curses] 17 "Rooms"
John Hammond Intermediate 12y ago
Python [curses] 16 Unicurses vs. Curses
🔐 Cybersecurity
Python [curses] 16 Unicurses vs. Curses
John Hammond Intermediate 13y ago
Python [curses] 15 Lines
🔐 Cybersecurity
Python [curses] 15 Lines
John Hammond Intermediate 13y ago
Python [curses] 14 Creating a "Player"
🔐 Cybersecurity
Python [curses] 14 Creating a "Player"
John Hammond Intermediate 13y ago
Python [curses] 13 Organize Colors
🔐 Cybersecurity
Python [curses] 13 Organize Colors
John Hammond Intermediate 13y ago
Python [curses] 12 Safety First
🔐 Cybersecurity
Python [curses] 12 Safety First
John Hammond Intermediate 13y ago
Python [curses] 11 Window Background
🔐 Cybersecurity
Python [curses] 11 Window Background
John Hammond Intermediate 13y ago
Python [curses] 10 Panels
🔐 Cybersecurity
Python [curses] 10 Panels
John Hammond Intermediate 13y ago
Python [curses] 09 Window Box
🔐 Cybersecurity
Python [curses] 09 Window Box
John Hammond Intermediate 13y ago
Python [curses] 08 Windows
🔐 Cybersecurity
Python [curses] 08 Windows
John Hammond Intermediate 13y ago
Python [curses] 06 Color
🔐 Cybersecurity
Python [curses] 06 Color
John Hammond Intermediate 13y ago
Python [curses] 07 Handy Dandy Functions
🔐 Cybersecurity
Python [curses] 07 Handy Dandy Functions
John Hammond Intermediate 13y ago
Python [curses] 02 The Move Function
🔐 Cybersecurity
Python [curses] 02 The Move Function
John Hammond Intermediate 13y ago
Python [curses] 05 Attributes
🔐 Cybersecurity
Python [curses] 05 Attributes
John Hammond Intermediate 13y ago
Python [curses] 03 Exploring Getch
🔐 Cybersecurity
Python [curses] 03 Exploring Getch
John Hammond Intermediate 13y ago
Python [curses] 04 The Getmaxyx Function
🔐 Cybersecurity
Python [curses] 04 The Getmaxyx Function
John Hammond Intermediate 13y ago
Python [urllib] 04 Proxy
🔐 Cybersecurity
Python [urllib] 04 Proxy
John Hammond Intermediate 13y ago
Python [urllib] 03 Recreating 'Quote' Functions
🔐 Cybersecurity
Python [urllib] 03 Recreating 'Quote' Functions
John Hammond Intermediate 13y ago
Python [urllib] 02 URL Retrieve
🔐 Cybersecurity
Python [urllib] 02 URL Retrieve
John Hammond Intermediate 13y ago
Python [urllib] 01 URL Open
🔐 Cybersecurity
Python [urllib] 01 URL Open
John Hammond Intermediate 13y ago
Python [pyfiglet] Pyfiglet
🔐 Cybersecurity
Python [pyfiglet] Pyfiglet
John Hammond Intermediate 13y ago
Python [subprocess] 03 Popen Instances
🔐 Cybersecurity
Python [subprocess] 03 Popen Instances
John Hammond Intermediate 13y ago
Python [subprocess] 02 Check Output
🔐 Cybersecurity
Python [subprocess] 02 Check Output
John Hammond Intermediate 13y ago
Python [subprocess] 01 Call
🔐 Cybersecurity
Python [subprocess] 01 Call
John Hammond Intermediate 13y ago
Python 01 Experimenting with IDLE
🔐 Cybersecurity
Python 01 Experimenting with IDLE
John Hammond Intermediate 13y ago
Python 02 Data Types
🔐 Cybersecurity
Python 02 Data Types
John Hammond Intermediate 13y ago
Python 00 Installing IDLE on Linux
🔐 Cybersecurity
Python 00 Installing IDLE on Linux
John Hammond Intermediate 13y ago
Python 00 Installing IDLE on Windows
🔐 Cybersecurity
Python 00 Installing IDLE on Windows
John Hammond Intermediate 13y ago
Python [glob] The Glob Module
🔐 Cybersecurity
Python [glob] The Glob Module
John Hammond Intermediate 13y ago
Python [hashlib] 06 Crappy Conclusion
🔐 Cybersecurity
Python [hashlib] 06 Crappy Conclusion
John Hammond Intermediate 13y ago
Python [hashlib] 05 SHA512 Hashing
🔐 Cybersecurity
Python [hashlib] 05 SHA512 Hashing
John Hammond Intermediate 13y ago
Python [hashlib] 03 MD5 Hashing
🔐 Cybersecurity
Python [hashlib] 03 MD5 Hashing
John Hammond Intermediate 13y ago
Python [hashlib] 02 Algorithms
🔐 Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
Python [hashlib] 04 SHA1 Hashing
🔐 Cybersecurity
Python [hashlib] 04 SHA1 Hashing
John Hammond Intermediate 13y ago
Python [getpass] 02 Get Password
🔐 Cybersecurity
Python [getpass] 02 Get Password
John Hammond Intermediate 13y ago
Python [getpass] 01 Get User
🔐 Cybersecurity
Python [getpass] 01 Get User
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cloud Next Generation Firewall : évaluer vos besoins
📚 Coursera Course ↗
Self-paced
Cloud Next Generation Firewall : évaluer vos besoins
Opens on Coursera ↗
Network Traffic Analysis with Wireshark
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera ↗
Getting Started in Port Scanning Using Nmap and Kali Linux
📚 Coursera Course ↗
Self-paced
Getting Started in Port Scanning Using Nmap and Kali Linux
Opens on Coursera ↗
Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution
Opens on Coursera ↗
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
How to Analyze Tweet Engagement with Twitter Analytics
📚 Coursera Course ↗
Self-paced
How to Analyze Tweet Engagement with Twitter Analytics
Opens on Coursera ↗