✕ Clear filters
6,357 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 199,072📚 Coursera 18,138🎤 TED 1
Python 38 Getting Length
🔐 Cybersecurity
Python 38 Getting Length
John Hammond Intermediate 14y ago
Python 37 Getting Help
🔐 Cybersecurity
Python 37 Getting Help
John Hammond Intermediate 14y ago
Python 36 Modules
🔐 Cybersecurity
Python 36 Modules
John Hammond Intermediate 14y ago
Python 35 Reading From Files
🔐 Cybersecurity
Python 35 Reading From Files
John Hammond Intermediate 14y ago
Python 34 Writing To Files
🔐 Cybersecurity
Python 34 Writing To Files
John Hammond Intermediate 14y ago
Python 33 Dictionary Parameters
🔐 Cybersecurity
Python 33 Dictionary Parameters
John Hammond Intermediate 14y ago
Python 32 Tuple Parameters
🔐 Cybersecurity
Python 32 Tuple Parameters
John Hammond Intermediate 14y ago
Python 31 Multiple Inheritance
🔐 Cybersecurity
Python 31 Multiple Inheritance
John Hammond Intermediate 14y ago
Python 30 Inheritance
🔐 Cybersecurity
Python 30 Inheritance
John Hammond Intermediate 14y ago
Python 29 Constructor Parameters
🔐 Cybersecurity
Python 29 Constructor Parameters
John Hammond Intermediate 14y ago
Python 28 Constructors and Deconstructors
🔐 Cybersecurity
Python 28 Constructors and Deconstructors
John Hammond Intermediate 14y ago
Python 27 Classes and Self
🔐 Cybersecurity
Python 27 Classes and Self
John Hammond Intermediate 14y ago
Python 26 Object Oriented Programming
🔐 Cybersecurity
Python 26 Object Oriented Programming
John Hammond Intermediate 14y ago
Python 25 Dictionaries
🔐 Cybersecurity
Python 25 Dictionaries
John Hammond Intermediate 14y ago
Python 24 Slicing Lists, Strings, and Tuples
🔐 Cybersecurity
Python 24 Slicing Lists, Strings, and Tuples
John Hammond Intermediate 14y ago
Python 23 List Assignment and Tuples
🔐 Cybersecurity
Python 23 List Assignment and Tuples
John Hammond Intermediate 14y ago
Python 01 Experimenting with IDLE
🔐 Cybersecurity
Python 01 Experimenting with IDLE
John Hammond Intermediate 14y ago
Python 22 Lists
🔐 Cybersecurity
Python 22 Lists
John Hammond Intermediate 14y ago
Python 21 Break and Continue
🔐 Cybersecurity
Python 21 Break and Continue
John Hammond Intermediate 14y ago
Python 20 For Loops
🔐 Cybersecurity
Python 20 For Loops
John Hammond Intermediate 14y ago
Python 19 While Loop
🔐 Cybersecurity
Python 19 While Loop
John Hammond Intermediate 14y ago
Python 18 Logical Operators
🔐 Cybersecurity
Python 18 Logical Operators
John Hammond Intermediate 14y ago
Python 17 Nesting
🔐 Cybersecurity
Python 17 Nesting
John Hammond Intermediate 14y ago
Python 16 Else and Elif
🔐 Cybersecurity
Python 16 Else and Elif
John Hammond Intermediate 14y ago
Python 15 Testing Operators
🔐 Cybersecurity
Python 15 Testing Operators
John Hammond Intermediate 14y ago
Python 14 If Statement
🔐 Cybersecurity
Python 14 If Statement
John Hammond Intermediate 14y ago
Python 13 Function Return
🔐 Cybersecurity
Python 13 Function Return
John Hammond Intermediate 14y ago
Python 12 Default Parameters
🔐 Cybersecurity
Python 12 Default Parameters
John Hammond Intermediate 14y ago
Python 11 Function Parameters
🔐 Cybersecurity
Python 11 Function Parameters
John Hammond Intermediate 14y ago
Python 10 Functions Scope
🔐 Cybersecurity
Python 10 Functions Scope
John Hammond Intermediate 14y ago
Python 09 Basic Functions
🔐 Cybersecurity
Python 09 Basic Functions
John Hammond Intermediate 14y ago
Python 08 Programming Style and Comments
🔐 Cybersecurity
Python 08 Programming Style and Comments
John Hammond Intermediate 14y ago
Python 07 Input and Output
🔐 Cybersecurity
Python 07 Input and Output
John Hammond Intermediate 14y ago
Python 06 Running Scripts
🔐 Cybersecurity
Python 06 Running Scripts
John Hammond Intermediate 14y ago
Python 05 Variables
🔐 Cybersecurity
Python 05 Variables
John Hammond Intermediate 14y ago
Python 04 Working With Strings
🔐 Cybersecurity
Python 04 Working With Strings
John Hammond Intermediate 14y ago
Python 03 Operating on Data
🔐 Cybersecurity
Python 03 Operating on Data
John Hammond Intermediate 14y ago
Python 02 Data Types
🔐 Cybersecurity
Python 02 Data Types
John Hammond Intermediate 14y ago
Python 75 List Reverse
🔐 Cybersecurity
Python 75 List Reverse
John Hammond Intermediate 14y ago
Sure has been a while!
🔐 Cybersecurity
Sure has been a while!
John Hammond Intermediate 14y ago
Fix dates with PHP?
🔐 Cybersecurity
Fix dates with PHP?
John Hammond Intermediate 14y ago
2012, Baby!
🔐 Cybersecurity
2012, Baby!
John Hammond Intermediate 14y ago
GM Shell, and Notes!
🔐 Cybersecurity
GM Shell, and Notes!
John Hammond Intermediate 14y ago
Christmas, Vacation and Python!
🔐 Cybersecurity
Christmas, Vacation and Python!
John Hammond Intermediate 14y ago
It's almost Christmas!
🔐 Cybersecurity
It's almost Christmas!
John Hammond Intermediate 14y ago
English Vocab, and More Python!
🔐 Cybersecurity
English Vocab, and More Python!
John Hammond Intermediate 14y ago
HTML, Net Shares, GML!
🔐 Cybersecurity
HTML, Net Shares, GML!
John Hammond Intermediate 14y ago
Python Experiments!
🔐 Cybersecurity
Python Experiments!
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cyber Security: Data Security and Information Privacy
📚 Coursera Course ↗
Self-paced
Cyber Security: Data Security and Information Privacy
Opens on Coursera ↗
Real-Time Cyber Threat Detection and Mitigation
📚 Coursera Course ↗
Self-paced
Real-Time Cyber Threat Detection and Mitigation
Opens on Coursera ↗
Fundamentals of Network Security and Cryptography
📚 Coursera Course ↗
Self-paced
Fundamentals of Network Security and Cryptography
Opens on Coursera ↗
The Embedded Linux Security Handbook
📚 Coursera Course ↗
Self-paced
The Embedded Linux Security Handbook
Opens on Coursera ↗
CompTIA Cloud CV0-003: Unit 4
📚 Coursera Course ↗
Self-paced
CompTIA Cloud CV0-003: Unit 4
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗