✕ Clear filters
6,354 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,969📚 Coursera 18,124🎤 TED 1
Free Cisco VIRL server! You can now use VIRL for free!  Thank you Cisco DevNet!
🔐 Cybersecurity
Free Cisco VIRL server! You can now use VIRL for free! Thank you Cisco DevNet!
David Bombal Beginner 7y ago
Becoming a Growth Designer (w/ Lex Roman)
🔐 Cybersecurity
Becoming a Growth Designer (w/ Lex Roman)
Flux Academy Beginner 7y ago
Maltego - Automated Information Gathering
🔐 Cybersecurity
Maltego - Automated Information Gathering
HackerSploit Intermediate 7y ago
STOP Wasting Your Time, Watch This Video To Get Motivated...
🔐 Cybersecurity
STOP Wasting Your Time, Watch This Video To Get Motivated...
David Bombal Intermediate 7y ago
Dr. Yair Maimon: Ht 9 – Unfolding the Mystery of Universe and Man
🔐 Cybersecurity
Dr. Yair Maimon: Ht 9 – Unfolding the Mystery of Universe and Man
TCM Academy Intermediate 7y ago
picoCTF 2018 [28] RSA Madlibs
🔐 Cybersecurity
picoCTF 2018 [28] RSA Madlibs
John Hammond Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
🔐 Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
HackTheBox - Jerry
🔐 Cybersecurity
HackTheBox - Jerry
IppSec Beginner 7y ago
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
🔐 Cybersecurity
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
What is SD-WAN? say GOODBYE to MPLS, DMVPN, iWAN... w/ SDN, Cisco and Viptela
🔐 Cybersecurity
What is SD-WAN? say GOODBYE to MPLS, DMVPN, iWAN... w/ SDN, Cisco and Viptela
NetworkChuck Beginner 7y ago
HackTheBox - Reel
🔐 Cybersecurity
HackTheBox - Reel
IppSec Beginner 7y ago
Elisabeth Rochat de la Vallée: Numerology in the Classics - The number 0
🔐 Cybersecurity
Elisabeth Rochat de la Vallée: Numerology in the Classics - The number 0
TCM Academy Beginner 7y ago
Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018
🔐 Cybersecurity
Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018
LiveOverflow Beginner 7y ago
Node.js Rest API With Restify, Mongoose, JWT - Part 2
🔐 Cybersecurity
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Traversy Media Intermediate 7y ago
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
🔐 Cybersecurity
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
LiveOverflow Intermediate 7y ago
Practical Advice for Submitting to Speak at a Cybersecurity Conference
🔐 Cybersecurity
Practical Advice for Submitting to Speak at a Cybersecurity Conference
SANS Institute Advanced 7y ago
The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018
🔐 Cybersecurity
The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018
SANS Institute Intermediate 7y ago
Hardware Hacking - Computerphile
🔐 Cybersecurity
Hardware Hacking - Computerphile
Computerphile Intermediate 7y ago
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
🔐 Cybersecurity
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
John Hammond Beginner 7y ago
WebMap - A Dashboard For Nmap Scans
🔐 Cybersecurity
WebMap - A Dashboard For Nmap Scans
HackerSploit Intermediate 7y ago
picoCTF 2018 [26] Caesar Cipher 2
🔐 Cybersecurity
picoCTF 2018 [26] Caesar Cipher 2
John Hammond Intermediate 7y ago
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
🔐 Cybersecurity
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
John Hammond Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
🔐 Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
picoCTF 2018 [24] Assembly 2
🔐 Cybersecurity
picoCTF 2018 [24] Assembly 2
John Hammond Intermediate 7y ago
Wireshark - Display Filters
🔐 Cybersecurity
Wireshark - Display Filters
HackerSploit Intermediate 7y ago
Wireshark - Capture Filters
🔐 Cybersecurity
Wireshark - Capture Filters
HackerSploit Intermediate 7y ago
Wireshark - Interface & OSI Model
🔐 Cybersecurity
Wireshark - Interface & OSI Model
HackerSploit Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
🔐 Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
🔐 Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
BsidesCT 2018 TRIVIA Challenges
🔐 Cybersecurity
BsidesCT 2018 TRIVIA Challenges
John Hammond Intermediate 7y ago
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
🔐 Cybersecurity
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
David Bombal Intermediate 7y ago
HackTheBox - DropZone
🔐 Cybersecurity
HackTheBox - DropZone
IppSec Beginner 7y ago
International Certificate in Oncology Acupuncture - Testimonials
🔐 Cybersecurity
International Certificate in Oncology Acupuncture - Testimonials
TCM Academy Intermediate 7y ago
Alexa, Start CCNA Quiz: Interactive Amazon Alexa CCNA Quiz
🔐 Cybersecurity
Alexa, Start CCNA Quiz: Interactive Amazon Alexa CCNA Quiz
David Bombal Beginner 7y ago
HackTheBox - Bounty
🔐 Cybersecurity
HackTheBox - Bounty
IppSec Beginner 7y ago
OWASP Juice Shop - SQL Injection
🔐 Cybersecurity
OWASP Juice Shop - SQL Injection
HackerSploit Intermediate 7y ago
REPLICATING THE FACEBOOK HACK
🔐 Cybersecurity
REPLICATING THE FACEBOOK HACK
John Hammond Intermediate 7y ago
Cisco NX-OS APIs (NX-API): Lots of options to chose from. Learn Nexus APIs with Hank Preston.
🔐 Cybersecurity
Cisco NX-OS APIs (NX-API): Lots of options to chose from. Learn Nexus APIs with Hank Preston.
David Bombal Beginner 7y ago
Securing Windows with DISA STIGs
🔐 Cybersecurity
Securing Windows with DISA STIGs
John Hammond Intermediate 7y ago
SANS Webcast - YARA - Effectively using and generating rules
🔐 Cybersecurity
SANS Webcast - YARA - Effectively using and generating rules
SANS Institute Intermediate 7y ago
SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
🔐 Cybersecurity
SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
SANS Institute Beginner 7y ago
SANS Webcast - Perimeter Security and Why it is Obsolete
🔐 Cybersecurity
SANS Webcast - Perimeter Security and Why it is Obsolete
SANS Institute Advanced 7y ago
picoCTF 2018 [23] Absolutely Relative
🔐 Cybersecurity
picoCTF 2018 [23] Absolutely Relative
John Hammond Intermediate 7y ago
picoCTF 2018 [22] The Vault & What's My Name
🔐 Cybersecurity
picoCTF 2018 [22] The Vault & What's My Name
John Hammond Intermediate 7y ago
picoCTF 2018 [20] You Cant See Me & Buttons
🔐 Cybersecurity
picoCTF 2018 [20] You Cant See Me & Buttons
John Hammond Intermediate 7y ago
picoCTF 2018 [19] What Base Is This?
🔐 Cybersecurity
picoCTF 2018 [19] What Base Is This?
John Hammond Intermediate 7y ago
picoCTF 2018 [18] Shellcode
🔐 Cybersecurity
picoCTF 2018 [18] Shellcode
John Hammond Intermediate 7y ago
Reversing Engineering XOR | picoCTF [17] quackme
🔐 Cybersecurity
Reversing Engineering XOR | picoCTF [17] quackme
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
📚 Coursera Course ↗
Self-paced
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
Opens on Coursera ↗
Aspiring CIO & CISO: Leadership Development Guide
📚 Coursera Course ↗
Self-paced
Aspiring CIO & CISO: Leadership Development Guide
Opens on Coursera ↗
Software Security Testing
📚 Coursera Course ↗
Self-paced
Software Security Testing
Opens on Coursera ↗
CISSP Domain 1: Security and Risk Management
📚 Coursera Course ↗
Self-paced
CISSP Domain 1: Security and Risk Management
Opens on Coursera ↗
 Vulnerability Assessment and Management
📚 Coursera Course ↗
Self-paced
Vulnerability Assessment and Management
Opens on Coursera ↗
Security Governance & Compliance
📚 Coursera Course ↗
Self-paced
Security Governance & Compliance
Opens on Coursera ↗