✕ Clear filters
6,355 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,988📚 Coursera 18,125🎤 TED 1
Brute-forcing Vignere Cipher | "Vinegar" TJCTF 2018
🔐 Cybersecurity
Brute-forcing Vignere Cipher | "Vinegar" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Cookies | "Cookie Monster" TJCTF 2018
🔐 Cybersecurity
HTTP Cookies | "Cookie Monster" TJCTF 2018
John Hammond Intermediate 7y ago
Cisco VIRL download, installation & configuration (Part 5): Mac VM Maestro install
🔐 Cybersecurity
Cisco VIRL download, installation & configuration (Part 5): Mac VM Maestro install
David Bombal Beginner 7y ago
Cisco VIRL download, installation & configuration (Part 4): VM Maestro and build networks
🔐 Cybersecurity
Cisco VIRL download, installation & configuration (Part 4): VM Maestro and build networks
David Bombal Beginner 7y ago
Reversing Input Validation (Keygen part 1) - Pwn Adventure 3
🔐 Cybersecurity
Reversing Input Validation (Keygen part 1) - Pwn Adventure 3
LiveOverflow Beginner 7y ago
Web App Penetration Testing - #14 - Cookie Collection & Reverse Engineering
🔐 Cybersecurity
Web App Penetration Testing - #14 - Cookie Collection & Reverse Engineering
HackerSploit Intermediate 7y ago
How To Install OWASP Juice Shop
🔐 Cybersecurity
How To Install OWASP Juice Shop
HackerSploit Intermediate 7y ago
HackTheBox - Valentine
🔐 Cybersecurity
HackTheBox - Valentine
IppSec Beginner 7y ago
Analyzing the Blocky Logic Puzzle  - Pwn Adventure 3
🔐 Cybersecurity
Analyzing the Blocky Logic Puzzle - Pwn Adventure 3
LiveOverflow Beginner 7y ago
HTML Source Code | "Blank" TJCTF 2018
🔐 Cybersecurity
HTML Source Code | "Blank" TJCTF 2018
John Hammond Intermediate 7y ago
String Extension w/ Ltrace | "Validator" TJCTF 2018
🔐 Cybersecurity
String Extension w/ Ltrace | "Validator" TJCTF 2018
John Hammond Intermediate 7y ago
Brute-Force Attack | "Python Reversing" TJCTF 2018
🔐 Cybersecurity
Brute-Force Attack | "Python Reversing" TJCTF 2018
John Hammond Intermediate 7y ago
Joining Discord | "Discord" TJCTF 2018
🔐 Cybersecurity
Joining Discord | "Discord" TJCTF 2018
John Hammond Intermediate 7y ago
Git Repository Depth | "Huuuuuge" TJCTF 2018
🔐 Cybersecurity
Git Repository Depth | "Huuuuuge" TJCTF 2018
John Hammond Intermediate 7y ago
Decimal to Hex | "Nothing But Everything" TJCTF 2018
🔐 Cybersecurity
Decimal to Hex | "Nothing But Everything" TJCTF 2018
John Hammond Intermediate 7y ago
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
🔐 Cybersecurity
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
John Hammond Intermediate 7y ago
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
🔐 Cybersecurity
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
John Hammond Intermediate 7y ago
Local File Inclusion | "Programmable Hyperlinked Pasta" TJCTF 2018
🔐 Cybersecurity
Local File Inclusion | "Programmable Hyperlinked Pasta" TJCTF 2018
John Hammond Intermediate 7y ago
GIF Strings | "Trippy" TJCTF 2018
🔐 Cybersecurity
GIF Strings | "Trippy" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Request Options | "Request Me" TJCTF 2018
🔐 Cybersecurity
HTTP Request Options | "Request Me" TJCTF 2018
John Hammond Intermediate 7y ago
Stego with Stegsolve.jar | "Weird Logo" TJCTF 2018
🔐 Cybersecurity
Stego with Stegsolve.jar | "Weird Logo" TJCTF 2018
John Hammond Intermediate 7y ago
RGB Color Threshold | "Interference" TJCTF 2018
🔐 Cybersecurity
RGB Color Threshold | "Interference" TJCTF 2018
John Hammond Intermediate 7y ago
Solving Wordsearches | "Caesar's Complication" TJCTF 2018
🔐 Cybersecurity
Solving Wordsearches | "Caesar's Complication" TJCTF 2018
John Hammond Intermediate 7y ago
RSA Cryptography | "Classic" TJCTF 2018
🔐 Cybersecurity
RSA Cryptography | "Classic" TJCTF 2018
John Hammond Intermediate 7y ago
MD5 Hash Crack | "Central Savings Agency" TJCTF 2018
🔐 Cybersecurity
MD5 Hash Crack | "Central Savings Agency" TJCTF 2018
John Hammond Intermediate 7y ago
Cisco VIRL download, installation & configuration (Part 3): VIRL Licensing
🔐 Cybersecurity
Cisco VIRL download, installation & configuration (Part 3): VIRL Licensing
David Bombal Beginner 7y ago
Cisco VIRL download, installation & configuration (Part 2): Download OVA & initial boot of VIRL VM
🔐 Cybersecurity
Cisco VIRL download, installation & configuration (Part 2): Download OVA & initial boot of VIRL VM
David Bombal Beginner 7y ago
Cisco VIRL download, installation and configuration (Part 1): Overview
🔐 Cybersecurity
Cisco VIRL download, installation and configuration (Part 1): Overview
David Bombal Beginner 7y ago
PicoCTF 2017 [33] A Thing Called the Stack
🔐 Cybersecurity
PicoCTF 2017 [33] A Thing Called the Stack
John Hammond Intermediate 7y ago
Web App Penetration Testing  - #13 - CSRF (Cross Site Request Forgery)
🔐 Cybersecurity
Web App Penetration Testing - #13 - CSRF (Cross Site Request Forgery)
HackerSploit Intermediate 7y ago
Chinese Remainder Theorem | PicoCTF 2017 [32] Weird RSA
🔐 Cybersecurity
Chinese Remainder Theorem | PicoCTF 2017 [32] Weird RSA
John Hammond Intermediate 7y ago
How Did You Get Into Programming?
🔐 Cybersecurity
How Did You Get Into Programming?
John Hammond Intermediate 7y ago
PicoCTF 2017 [31] LeakedHashes
🔐 Cybersecurity
PicoCTF 2017 [31] LeakedHashes
John Hammond Intermediate 7y ago
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
🔐 Cybersecurity
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
John Hammond Intermediate 7y ago
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
🔐 Cybersecurity
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
John Hammond Intermediate 7y ago
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
🔐 Cybersecurity
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
John Hammond Intermediate 7y ago
Sudo ltrace | Ryan's CTF [15] Strings wont help you
🔐 Cybersecurity
Sudo ltrace | Ryan's CTF [15] Strings wont help you
John Hammond Intermediate 7y ago
Embedded GZIP | Ryan's CTF [14] Mystery File
🔐 Cybersecurity
Embedded GZIP | Ryan's CTF [14] Mystery File
John Hammond Intermediate 7y ago
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
🔐 Cybersecurity
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
John Hammond Intermediate 7y ago
Command Injection | Ryan's CTF [12] Input Validation
🔐 Cybersecurity
Command Injection | Ryan's CTF [12] Input Validation
John Hammond Intermediate 7y ago
ALIAS Commands | Ryan's CTF [11] Find Flag Again
🔐 Cybersecurity
ALIAS Commands | Ryan's CTF [11] Find Flag Again
John Hammond Intermediate 7y ago
Reversing Android APK | Ryan's CTF [10] These are not the droids
🔐 Cybersecurity
Reversing Android APK | Ryan's CTF [10] These are not the droids
John Hammond Intermediate 7y ago
Binary ltrace | Ryan's CTF [08] What's the password?
🔐 Cybersecurity
Binary ltrace | Ryan's CTF [08] What's the password?
John Hammond Intermediate 7y ago
Image Strings | Ryan's CTF [07] "Stenography"
🔐 Cybersecurity
Image Strings | Ryan's CTF [07] "Stenography"
John Hammond Intermediate 7y ago
VIM Shell | Ryan's CTF [06] Escape the Jail
🔐 Cybersecurity
VIM Shell | Ryan's CTF [06] Escape the Jail
John Hammond Intermediate 7y ago
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
🔐 Cybersecurity
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
John Hammond Intermediate 7y ago
PATH Environment Variable | Ryan's CTF [09] Find the Flag
🔐 Cybersecurity
PATH Environment Variable | Ryan's CTF [09] Find the Flag
John Hammond Intermediate 7y ago
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
🔐 Cybersecurity
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
John Hammond Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Securing Systems and Networks
📚 Coursera Course ↗
Self-paced
Securing Systems and Networks
Opens on Coursera ↗
Design security solutions for applications and data
📚 Coursera Course ↗
Self-paced
Design security solutions for applications and data
Opens on Coursera ↗
Cyber Security for Absolute Beginners – Part 1
📚 Coursera Course ↗
Self-paced
Cyber Security for Absolute Beginners – Part 1
Opens on Coursera ↗
Wireshark for Beginners: Capture Packets
📚 Coursera Course ↗
Self-paced
Wireshark for Beginners: Capture Packets
Opens on Coursera ↗
Palo Alto Networks Cybersecurity Fundamentals
📚 Coursera Course ↗
Self-paced
Palo Alto Networks Cybersecurity Fundamentals
Opens on Coursera ↗
Advanced Network Attacks, Web Hacking, and Cryptography
📚 Coursera Course ↗
Self-paced
Advanced Network Attacks, Web Hacking, and Cryptography
Opens on Coursera ↗