✕ Clear filters
2,558 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,439📚 Coursera 18,118🎤 TED 1
Batch 04 Environment Variables
🔐 Cybersecurity
Batch 04 Environment Variables
John Hammond Intermediate 13y ago
Batch 05 String "Concatenation"
🔐 Cybersecurity
Batch 05 String "Concatenation"
John Hammond Intermediate 13y ago
Batch 06 Scripts
🔐 Cybersecurity
Batch 06 Scripts
John Hammond Intermediate 13y ago
Batch 07 Notepad to Notepad++
🔐 Cybersecurity
Batch 07 Notepad to Notepad++
John Hammond Intermediate 13y ago
Batch 08 Output with Echo
🔐 Cybersecurity
Batch 08 Output with Echo
John Hammond Intermediate 13y ago
Source SDK Maps, what?
🔐 Cybersecurity
Source SDK Maps, what?
John Hammond Intermediate 14y ago
Python 74 List Remove
🔐 Cybersecurity
Python 74 List Remove
John Hammond Intermediate 14y ago
Python 73 List Insert
🔐 Cybersecurity
Python 73 List Insert
John Hammond Intermediate 14y ago
Python 72 List Index
🔐 Cybersecurity
Python 72 List Index
John Hammond Intermediate 14y ago
Python 71 List Count
🔐 Cybersecurity
Python 71 List Count
John Hammond Intermediate 14y ago
Python 70 List Append
🔐 Cybersecurity
Python 70 List Append
John Hammond Intermediate 14y ago
Python 69 String zfill
🔐 Cybersecurity
Python 69 String zfill
John Hammond Intermediate 14y ago
Python 68 String To Upper
🔐 Cybersecurity
Python 68 String To Upper
John Hammond Intermediate 14y ago
Python 67 String Swapcase
🔐 Cybersecurity
Python 67 String Swapcase
John Hammond Intermediate 14y ago
Python 66 String Split Lines
🔐 Cybersecurity
Python 66 String Split Lines
John Hammond Intermediate 14y ago
Python 64 String Right Strip
🔐 Cybersecurity
Python 64 String Right Strip
John Hammond Intermediate 14y ago
Python 65 String Split
🔐 Cybersecurity
Python 65 String Split
John Hammond Intermediate 14y ago
Python 63 String Right Justify
🔐 Cybersecurity
Python 63 String Right Justify
John Hammond Intermediate 14y ago
Python 62 String Right Find
🔐 Cybersecurity
Python 62 String Right Find
John Hammond Intermediate 14y ago
Python 61 String Replace
🔐 Cybersecurity
Python 61 String Replace
John Hammond Intermediate 14y ago
Python 60 String Left Strip
🔐 Cybersecurity
Python 60 String Left Strip
John Hammond Intermediate 14y ago
Python 59 String to Lowercase
🔐 Cybersecurity
Python 59 String to Lowercase
John Hammond Intermediate 14y ago
Python 58 String Left Justify
🔐 Cybersecurity
Python 58 String Left Justify
John Hammond Intermediate 14y ago
Python 57 String Join
🔐 Cybersecurity
Python 57 String Join
John Hammond Intermediate 14y ago
Python 56 String is Space
🔐 Cybersecurity
Python 56 String is Space
John Hammond Intermediate 14y ago
Python 55 String Is Uppercase
🔐 Cybersecurity
Python 55 String Is Uppercase
John Hammond Intermediate 14y ago
Python 54 String is Lowercase
🔐 Cybersecurity
Python 54 String is Lowercase
John Hammond Intermediate 14y ago
Python 53 String is Full of Digits
🔐 Cybersecurity
Python 53 String is Full of Digits
John Hammond Intermediate 14y ago
Python 52 String is Alphabetical
🔐 Cybersecurity
Python 52 String is Alphabetical
John Hammond Intermediate 14y ago
Python 51 String Find
🔐 Cybersecurity
Python 51 String Find
John Hammond Intermediate 14y ago
Python 49 String Count
🔐 Cybersecurity
Python 49 String Count
John Hammond Intermediate 14y ago
Python 48 String Center
🔐 Cybersecurity
Python 48 String Center
John Hammond Intermediate 14y ago
Python 47 String Capitalize
🔐 Cybersecurity
Python 47 String Capitalize
John Hammond Intermediate 14y ago
Python 46 Sorted Function
🔐 Cybersecurity
Python 46 Sorted Function
John Hammond Intermediate 14y ago
Python 45 Sum Function
🔐 Cybersecurity
Python 45 Sum Function
John Hammond Intermediate 14y ago
Python 44 Range Function
🔐 Cybersecurity
Python 44 Range Function
John Hammond Intermediate 14y ago
Python 43 Absolute Value Function
🔐 Cybersecurity
Python 43 Absolute Value Function
John Hammond Intermediate 14y ago
Python 42 Power Function
🔐 Cybersecurity
Python 42 Power Function
John Hammond Intermediate 14y ago
Python 41 Maximum Value
🔐 Cybersecurity
Python 41 Maximum Value
John Hammond Intermediate 14y ago
Python 40 Minimum Value
🔐 Cybersecurity
Python 40 Minimum Value
John Hammond Intermediate 14y ago
Python 39 Multiple Lengths
🔐 Cybersecurity
Python 39 Multiple Lengths
John Hammond Intermediate 14y ago
Python 38 Getting Length
🔐 Cybersecurity
Python 38 Getting Length
John Hammond Intermediate 14y ago
Python 37 Getting Help
🔐 Cybersecurity
Python 37 Getting Help
John Hammond Intermediate 14y ago
Python 36 Modules
🔐 Cybersecurity
Python 36 Modules
John Hammond Intermediate 14y ago
Python 35 Reading From Files
🔐 Cybersecurity
Python 35 Reading From Files
John Hammond Intermediate 14y ago
Python 34 Writing To Files
🔐 Cybersecurity
Python 34 Writing To Files
John Hammond Intermediate 14y ago
Python 33 Dictionary Parameters
🔐 Cybersecurity
Python 33 Dictionary Parameters
John Hammond Intermediate 14y ago
Python 32 Tuple Parameters
🔐 Cybersecurity
Python 32 Tuple Parameters
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Workplace Harassment Prevention Training for Managers
📚 Coursera Course ↗
Self-paced
Workplace Harassment Prevention Training for Managers
Opens on Coursera ↗
The Art of Storytelling
📚 Coursera Course ↗
Self-paced
The Art of Storytelling
Opens on Coursera ↗
Securing Industrial Control and Safety Instrumented Systems
📚 Coursera Course ↗
Self-paced
Securing Industrial Control and Safety Instrumented Systems
Opens on Coursera ↗
Web Hacker's Toolbox - Tools Used by Successful Hackers
📚 Coursera Course ↗
Self-paced
Web Hacker's Toolbox - Tools Used by Successful Hackers
Opens on Coursera ↗
Leadership: Impactful Feedback in a Hybrid World
📚 Coursera Course ↗
Self-paced
Leadership: Impactful Feedback in a Hybrid World
Opens on Coursera ↗
Analyze Network Traffic with TCPDump: Build a Logging Tool
📚 Coursera Course ↗
Self-paced
Analyze Network Traffic with TCPDump: Build a Logging Tool
Opens on Coursera ↗