✕ Clear filters
6,354 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,939📚 Coursera 18,124🎤 TED 1
Linux Essentials For Hackers - #11 - Disk Usage
🔐 Cybersecurity
Linux Essentials For Hackers - #11 - Disk Usage
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
🔐 Cybersecurity
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
HackerSploit Intermediate 6y ago
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
🔐 Cybersecurity
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
John Hammond Intermediate 6y ago
Pentesting for n00bs: Episode 10 - Netmon
🔐 Cybersecurity
Pentesting for n00bs: Episode 10 - Netmon
The Cyber Mentor Beginner 6y ago
Kali Linux: Hacking Networks Part 2
🔐 Cybersecurity
Kali Linux: Hacking Networks Part 2
David Bombal Beginner 6y ago
Do you REALLY need a VPN?
🔐 Cybersecurity
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
John Hubbard - How were you introduced to SANS?
🔐 Cybersecurity
John Hubbard - How were you introduced to SANS?
SANS Institute Beginner 6y ago
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
🔐 Cybersecurity
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
SANS Institute Beginner 6y ago
PicoCTF 2019 [13] More Client-Side & Flags
🔐 Cybersecurity
PicoCTF 2019 [13] More Client-Side & Flags
John Hammond Intermediate 6y ago
Reading Player Position with DLL Injection - Pwn Adventure 3
🔐 Cybersecurity
Reading Player Position with DLL Injection - Pwn Adventure 3
LiveOverflow Beginner 6y ago
Kali Linux: Hacking Networks Part 1
🔐 Cybersecurity
Kali Linux: Hacking Networks Part 1
David Bombal Beginner 6y ago
What to Expect in an Ethical Hacking Interview
🔐 Cybersecurity
What to Expect in an Ethical Hacking Interview
The Cyber Mentor Beginner 6y ago
HackTheBox - Safe
🔐 Cybersecurity
HackTheBox - Safe
IppSec Intermediate 6y ago
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
🔐 Cybersecurity
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
HackerSploit Intermediate 6y ago
Cybertalk Clips | How To Improve Your CTF Skills
🔐 Cybersecurity
Cybertalk Clips | How To Improve Your CTF Skills
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
🔐 Cybersecurity
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #7 - Finding Files With Locate
🔐 Cybersecurity
Linux Essentials For Hackers - #7 - Finding Files With Locate
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #6 - grep & piping
🔐 Cybersecurity
Linux Essentials For Hackers - #6 - grep & piping
HackerSploit Intermediate 6y ago
Cybertalk - EP2 -  CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
🔐 Cybersecurity
Cybertalk - EP2 - CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
HackerSploit Intermediate 6y ago
Cybertalk Clips | Importance Of Secure Coding For Developers
🔐 Cybersecurity
Cybertalk Clips | Importance Of Secure Coding For Developers
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #5 - File & Directory Ownership
🔐 Cybersecurity
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
🔐 Cybersecurity
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
John Hubbard - How to determine whether SEC401 or SEC450 is best?
🔐 Cybersecurity
John Hubbard - How to determine whether SEC401 or SEC450 is best?
SANS Institute Beginner 6y ago
John Hubbard - Will SEC 450 carry a certification?
🔐 Cybersecurity
John Hubbard - Will SEC 450 carry a certification?
SANS Institute Beginner 6y ago
John Hubbard - At the end of the SEC450 course, what do students come away with?
🔐 Cybersecurity
John Hubbard - At the end of the SEC450 course, what do students come away with?
SANS Institute Beginner 6y ago
John Hubbard - What are some of the key tools covered in SEC450?
🔐 Cybersecurity
John Hubbard - What are some of the key tools covered in SEC450?
SANS Institute Beginner 6y ago
John Hubbard - A high level walk through of each day of the SEC450 course
🔐 Cybersecurity
John Hubbard - A high level walk through of each day of the SEC450 course
SANS Institute Beginner 6y ago
John Hubbard - Who exactly was the SEC450 course designed for?
🔐 Cybersecurity
John Hubbard - Who exactly was the SEC450 course designed for?
SANS Institute Beginner 6y ago
John Hubbard – About the SEC450: Blue Team Fundamentals course
🔐 Cybersecurity
John Hubbard – About the SEC450: Blue Team Fundamentals course
SANS Institute Beginner 6y ago
John Hubbard - How long did it actually take you to write the SEC450 course?
🔐 Cybersecurity
John Hubbard - How long did it actually take you to write the SEC450 course?
SANS Institute Beginner 6y ago
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
🔐 Cybersecurity
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
SANS Institute Beginner 6y ago
John Hubbard - Why were you the one to create a course for new Blue Teamers?
🔐 Cybersecurity
John Hubbard - Why were you the one to create a course for new Blue Teamers?
SANS Institute Beginner 6y ago
John Hubbard - How did teaching at SANS come about?
🔐 Cybersecurity
John Hubbard - How did teaching at SANS come about?
SANS Institute Beginner 6y ago
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
🔐 Cybersecurity
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
SANS Institute Beginner 6y ago
John Hubbard - some of the early challenges as a young SOC analyst
🔐 Cybersecurity
John Hubbard - some of the early challenges as a young SOC analyst
SANS Institute Beginner 6y ago
John Hubbard - aspirations of becoming an engineer
🔐 Cybersecurity
John Hubbard - aspirations of becoming an engineer
SANS Institute Beginner 6y ago
Introducing John Hubbard
🔐 Cybersecurity
Introducing John Hubbard
SANS Institute Beginner 6y ago
Linux Essentials For Hackers - #3 - File Management & Manipulation
🔐 Cybersecurity
Linux Essentials For Hackers - #3 - File Management & Manipulation
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
🔐 Cybersecurity
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #1 - Introduction
🔐 Cybersecurity
Linux Essentials For Hackers - #1 - Introduction
HackerSploit Beginner 6y ago
PicoCTF 2019 [12] Shark On Wire 1
🔐 Cybersecurity
PicoCTF 2019 [12] Shark On Wire 1
John Hammond Intermediate 6y ago
Security Awareness Recognition Program | SANS Security Awareness Summit
🔐 Cybersecurity
Security Awareness Recognition Program | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
How to Build Your Own Escape Room | SANS Security Awareness Summit
🔐 Cybersecurity
How to Build Your Own Escape Room | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
🔐 Cybersecurity
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
SANS Institute Advanced 6y ago
PicoCTF 2019 [11] What Lies Within & Extensions
🔐 Cybersecurity
PicoCTF 2019 [11] What Lies Within & Extensions
John Hammond Intermediate 6y ago
What sets SANS apart from other cyber security training providers
🔐 Cybersecurity
What sets SANS apart from other cyber security training providers
SANS Institute Intermediate 6y ago
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
🔐 Cybersecurity
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
PicoCTF 2019 [10] Robots.txt & Metadata
🔐 Cybersecurity
PicoCTF 2019 [10] Robots.txt & Metadata
John Hammond Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cyber Secure Coder (CSC-110)
📚 Coursera Course ↗
Self-paced
Cyber Secure Coder (CSC-110)
Opens on Coursera ↗
Network and Communications Security
📚 Coursera Course ↗
Self-paced
Network and Communications Security
Opens on Coursera ↗
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
Create a Custom Network and Apply Firewall Rules
📚 Coursera Course ↗
Self-paced
Create a Custom Network and Apply Firewall Rules
Opens on Coursera ↗
Communication and Network Security
📚 Coursera Course ↗
Self-paced
Communication and Network Security
Opens on Coursera ↗
Homeland Security and Cybersecurity Future
📚 Coursera Course ↗
Self-paced
Homeland Security and Cybersecurity Future
Opens on Coursera ↗