✕ Clear filters
6,357 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 199,052📚 Coursera 18,138🎤 TED 1
Batch 57 String Quotations
🔐 Cybersecurity
Batch 57 String Quotations
John Hammond Intermediate 13y ago
Batch 56 String Substitution
🔐 Cybersecurity
Batch 56 String Substitution
John Hammond Intermediate 13y ago
The Android Challenge
🔐 Cybersecurity
The Android Challenge
ColdFusion Intermediate 13y ago
Batch 55 Substrings
🔐 Cybersecurity
Batch 55 Substrings
John Hammond Intermediate 13y ago
Batch 53 Changing the Prompt
🔐 Cybersecurity
Batch 53 Changing the Prompt
John Hammond Intermediate 13y ago
Batch 52 Command Prompt Properties
🔐 Cybersecurity
Batch 52 Command Prompt Properties
John Hammond Intermediate 13y ago
Batch 51 Console Color
🔐 Cybersecurity
Batch 51 Console Color
John Hammond Intermediate 13y ago
Batch 50.5 Quick Output of File
🔐 Cybersecurity
Batch 50.5 Quick Output of File
John Hammond Intermediate 13y ago
Batch 50 Deleting Files
🔐 Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
🔐 Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
🔐 Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
🔐 Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
🔐 Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
🔐 Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 43 Intro to Redirection
🔐 Cybersecurity
Batch 43 Intro to Redirection
John Hammond Beginner 13y ago
Batch 42 Breakin' Outta the For Loop
🔐 Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
🔐 Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
🔐 Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
🔐 Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
🔐 Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
🔐 Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
🔐 Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
🔐 Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
🔐 Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
🔐 Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 33 For Loop Introduction
🔐 Cybersecurity
Batch 33 For Loop Introduction
John Hammond Beginner 13y ago
Batch 32 "While Loop"
🔐 Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
🔐 Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
🔐 Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
🔐 Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
🔐 Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
🔐 Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
🔐 Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
🔐 Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
🔐 Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
🔐 Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
🔐 Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
🔐 Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
🔐 Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
🔐 Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
🔐 Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
🔐 Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
🔐 Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
🔐 Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
🔐 Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
Batch 13 "Escape Characters"
🔐 Cybersecurity
Batch 13 "Escape Characters"
John Hammond Intermediate 13y ago
Batch 12 Echo Off
🔐 Cybersecurity
Batch 12 Echo Off
John Hammond Intermediate 13y ago
Batch 11 The @ Symbol
🔐 Cybersecurity
Batch 11 The @ Symbol
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Defending Against AI-Driven Phishing and Social Engineering
📚 Coursera Course ↗
Self-paced
Defending Against AI-Driven Phishing and Social Engineering
Opens on Coursera ↗
AWS: Data Protection and Security Governance
📚 Coursera Course ↗
Self-paced
AWS: Data Protection and Security Governance
Opens on Coursera ↗
IT & Cloud Audit Masterclass – Fundamentals to Advanced
📚 Coursera Course ↗
Self-paced
IT & Cloud Audit Masterclass – Fundamentals to Advanced
Opens on Coursera ↗
CompTIA A+ Core 2 (220-1202)
📚 Coursera Course ↗
Self-paced
CompTIA A+ Core 2 (220-1202)
Opens on Coursera ↗
AWS Networking, Compute & IAM Architecture
📚 Coursera Course ↗
Self-paced
AWS Networking, Compute & IAM Architecture
Opens on Coursera ↗
Security and Troubleshooting Essentials
📚 Coursera Course ↗
Self-paced
Security and Troubleshooting Essentials
Opens on Coursera ↗