✕ Clear filters
6,357 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 199,052📚 Coursera 18,138🎤 TED 1
Python [getpass] 01 Get User
🔐 Cybersecurity
Python [getpass] 01 Get User
John Hammond Intermediate 13y ago
Python [sys] 05 Autoreset
🔐 Cybersecurity
Python [sys] 05 Autoreset
John Hammond Intermediate 13y ago
The Nervous System - CrashCourse Biology #26
🔐 Cybersecurity
The Nervous System - CrashCourse Biology #26
CrashCourse Beginner 13y ago
Animal Behavior - CrashCourse Biology #25
🔐 Cybersecurity
Animal Behavior - CrashCourse Biology #25
CrashCourse Beginner 13y ago
Python [sys] 08 Conclusion
🔐 Cybersecurity
Python [sys] 08 Conclusion
John Hammond Intermediate 13y ago
Python [sys] 07 Command-line Arguments
🔐 Cybersecurity
Python [sys] 07 Command-line Arguments
John Hammond Intermediate 13y ago
Python [sys] 06 Streams
🔐 Cybersecurity
Python [sys] 06 Streams
John Hammond Intermediate 13y ago
Python [sys] 05 Exit Codes
🔐 Cybersecurity
Python [sys] 05 Exit Codes
John Hammond Intermediate 13y ago
Python [sys] 04 Windows Version
🔐 Cybersecurity
Python [sys] 04 Windows Version
John Hammond Intermediate 13y ago
Python [sys] 03 Platform
🔐 Cybersecurity
Python [sys] 03 Platform
John Hammond Intermediate 13y ago
Python [sys] 02 Module Madness
🔐 Cybersecurity
Python [sys] 02 Module Madness
John Hammond Intermediate 13y ago
Python [sys] 01 Basic Information
🔐 Cybersecurity
Python [sys] 01 Basic Information
John Hammond Intermediate 13y ago
Batch 93 Ipconfig Command
🔐 Cybersecurity
Batch 93 Ipconfig Command
John Hammond Intermediate 13y ago
Batch 92 Nslookup Command
🔐 Cybersecurity
Batch 92 Nslookup Command
John Hammond Intermediate 13y ago
nullshell.com Forum!
🔐 Cybersecurity
nullshell.com Forum!
John Hammond Intermediate 13y ago
Batch 91 Custom Shell
🔐 Cybersecurity
Batch 91 Custom Shell
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
🔐 Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
🔐 Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
🔐 Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
🔐 Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
🔐 Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
🔐 Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
Batch 84 String Swapcase
🔐 Cybersecurity
Batch 84 String Swapcase
John Hammond Intermediate 13y ago
Batch 83 String to Upper
🔐 Cybersecurity
Batch 83 String to Upper
John Hammond Intermediate 13y ago
Batch 82 String to Lower
🔐 Cybersecurity
Batch 82 String to Lower
John Hammond Intermediate 13y ago
Batch 81 String Join
🔐 Cybersecurity
Batch 81 String Join
John Hammond Intermediate 13y ago
Batch 80 String is Upper
🔐 Cybersecurity
Batch 80 String is Upper
John Hammond Intermediate 13y ago
Batch 79 String is Full of Digits
🔐 Cybersecurity
Batch 79 String is Full of Digits
John Hammond Intermediate 13y ago
Batch 78 String is Lower
🔐 Cybersecurity
Batch 78 String is Lower
John Hammond Intermediate 13y ago
Batch 77 String is Alphabetical
🔐 Cybersecurity
Batch 77 String is Alphabetical
John Hammond Intermediate 13y ago
Batch 76 String Find
🔐 Cybersecurity
Batch 76 String Find
John Hammond Intermediate 13y ago
Batch 75 String Startswith and Endswith
🔐 Cybersecurity
Batch 75 String Startswith and Endswith
John Hammond Beginner 13y ago
Batch 73 String Count
🔐 Cybersecurity
Batch 73 String Count
John Hammond Intermediate 13y ago
Batch 72 String Capitalize
🔐 Cybersecurity
Batch 72 String Capitalize
John Hammond Intermediate 13y ago
Batch 54 Colormsg Script
🔐 Cybersecurity
Batch 54 Colormsg Script
John Hammond Intermediate 13y ago
Batch 71 String Center
🔐 Cybersecurity
Batch 71 String Center
John Hammond Intermediate 13y ago
Batch 70 Sort Function
🔐 Cybersecurity
Batch 70 Sort Function
John Hammond Intermediate 13y ago
Batch 69 Sum Function
🔐 Cybersecurity
Batch 69 Sum Function
John Hammond Intermediate 13y ago
Batch 68 Range Function
🔐 Cybersecurity
Batch 68 Range Function
John Hammond Intermediate 13y ago
Batch 67 Absolute Value Function
🔐 Cybersecurity
Batch 67 Absolute Value Function
John Hammond Intermediate 13y ago
Batch 66 Power Function
🔐 Cybersecurity
Batch 66 Power Function
John Hammond Intermediate 13y ago
Batch 65 Maximum Function
🔐 Cybersecurity
Batch 65 Maximum Function
John Hammond Intermediate 13y ago
Batch 64 Minimum Function
🔐 Cybersecurity
Batch 64 Minimum Function
John Hammond Intermediate 13y ago
Batch 63 Testing Delayed Variable Expansion
🔐 Cybersecurity
Batch 63 Testing Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 61 Building Arrays
🔐 Cybersecurity
Batch 61 Building Arrays
John Hammond Intermediate 13y ago
Batch 60 Modifying "Create String" Function
🔐 Cybersecurity
Batch 60 Modifying "Create String" Function
John Hammond Intermediate 13y ago
Batch 59 Continuing "Create String" Function
🔐 Cybersecurity
Batch 59 Continuing "Create String" Function
John Hammond Intermediate 13y ago
Batch 58 Building "Create String" Function
🔐 Cybersecurity
Batch 58 Building "Create String" Function
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
OWASP Top 10 - Risks 6-10
📚 Coursera Course ↗
Self-paced
OWASP Top 10 - Risks 6-10
Opens on Coursera ↗
Security and Troubleshooting Essentials
📚 Coursera Course ↗
Self-paced
Security and Troubleshooting Essentials
Opens on Coursera ↗
Reporting and Advanced Practices
📚 Coursera Course ↗
Self-paced
Reporting and Advanced Practices
Opens on Coursera ↗
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
📚 Coursera Course ↗
Self-paced
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
Opens on Coursera ↗
Wireshark 101: Packet Analysis Essentials
📚 Coursera Course ↗
Self-paced
Wireshark 101: Packet Analysis Essentials
Opens on Coursera ↗
Network Defense Strategies
📚 Coursera Course ↗
Self-paced
Network Defense Strategies
Opens on Coursera ↗