✕ Clear filters
6,354 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,949📚 Coursera 18,124🎤 TED 1
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
🔐 Cybersecurity
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
HackerSploit Beginner 6y ago
Bug Bounty Hunting - Tools I Use
🔐 Cybersecurity
Bug Bounty Hunting - Tools I Use
HackerSploit Beginner 6y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
🔐 Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 6y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
🔐 Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 6y ago
HackTheBox - Redcross
🔐 Cybersecurity
HackTheBox - Redcross
IppSec Beginner 6y ago
SunshineCTF 2019: Wrestler Name Generator (XML XXE)
🔐 Cybersecurity
SunshineCTF 2019: Wrestler Name Generator (XML XXE)
John Hammond Intermediate 6y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
🔐 Cybersecurity
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 6y ago
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
🔐 Cybersecurity
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
David Bombal Advanced 6y ago
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor Beginner 6y ago
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor Beginner 7y ago
KALI LINUX! - CS50 Live, EP. 51
🔐 Cybersecurity
KALI LINUX! - CS50 Live, EP. 51
CS50 Intermediate 7y ago
LIVE CTF, PART 2! - CS50 Live, EP. 50
🔐 Cybersecurity
LIVE CTF, PART 2! - CS50 Live, EP. 50
CS50 Beginner 7y ago
Treating the 5 Types of Menopause: course excerpt
🔐 Cybersecurity
Treating the 5 Types of Menopause: course excerpt
TCM Academy Beginner 7y ago
SANS Security Operations Summit & Training 2019: Sneak Peek
🔐 Cybersecurity
SANS Security Operations Summit & Training 2019: Sneak Peek
SANS Institute Intermediate 7y ago
SunshineCTF 2019 | Return to Mania (PWN) PIE
🔐 Cybersecurity
SunshineCTF 2019 | Return to Mania (PWN) PIE
John Hammond Intermediate 6y ago
CCNA Quiz: IP Subnetting. Can you answer this question? CCNA Quiz Questions
🔐 Cybersecurity
CCNA Quiz: IP Subnetting. Can you answer this question? CCNA Quiz Questions
David Bombal Intermediate 6y ago
SunshineCTF 2019 | CB1 (NATO Phonetic Alphabet)
🔐 Cybersecurity
SunshineCTF 2019 | CB1 (NATO Phonetic Alphabet)
John Hammond Intermediate 6y ago
SunshineCTF 2019 | Brainmeat (Esoteric Languages)
🔐 Cybersecurity
SunshineCTF 2019 | Brainmeat (Esoteric Languages)
John Hammond Intermediate 6y ago
CCNA Quiz: Administrative Distance. Which route is selected and why? EIGRP, OSPF or RIP? CCNA | CCNP
🔐 Cybersecurity
CCNA Quiz: Administrative Distance. Which route is selected and why? EIGRP, OSPF or RIP? CCNA | CCNP
David Bombal Intermediate 6y ago
SunshineCTF 2019: WelcomeCrypto [ROT47]
🔐 Cybersecurity
SunshineCTF 2019: WelcomeCrypto [ROT47]
John Hammond Intermediate 6y ago
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
🔐 Cybersecurity
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
John Hammond Beginner 6y ago
HackTheBox - Curling - Walkthrough
🔐 Cybersecurity
HackTheBox - Curling - Walkthrough
HackerSploit Intermediate 6y ago
HackTheBox - Vault
🔐 Cybersecurity
HackTheBox - Vault
IppSec Beginner 6y ago
b00t2root19 CTF: Loopback [PCAP Forensics]
🔐 Cybersecurity
b00t2root19 CTF: Loopback [PCAP Forensics]
John Hammond Intermediate 6y ago
b00t2root19 CTF: Treasure [GameBoy ROMs]
🔐 Cybersecurity
b00t2root19 CTF: Treasure [GameBoy ROMs]
John Hammond Intermediate 6y ago
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
🔐 Cybersecurity
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
John Hammond Intermediate 7y ago
CommandoVM Installation - Windows-based Penetration Testing Distribution
🔐 Cybersecurity
CommandoVM Installation - Windows-based Penetration Testing Distribution
HackerSploit Intermediate 7y ago
b00t2root19 CTF: Genetics [DNA Cryptography]
🔐 Cybersecurity
b00t2root19 CTF: Genetics [DNA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
🔐 Cybersecurity
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
John Hammond Intermediate 7y ago
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
🔐 Cybersecurity
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
🔐 Cybersecurity
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
🔐 Cybersecurity
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
John Hammond Intermediate 7y ago
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
🔐 Cybersecurity
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
David Bombal Intermediate 7y ago
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
🔐 Cybersecurity
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
John Hammond Intermediate 7y ago
Zero to Hero Pentesting: Episode 2 - Python 101
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor Beginner 7y ago
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
🔐 Cybersecurity
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
HackerSploit Intermediate 7y ago
Counting Colors w/ Python PIL & PrettyTable
🔐 Cybersecurity
Counting Colors w/ Python PIL & PrettyTable
John Hammond Intermediate 7y ago
How To Manually Sign APK's with Jarsigner & Zipalign
🔐 Cybersecurity
How To Manually Sign APK's with Jarsigner & Zipalign
HackerSploit Intermediate 7y ago
Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
🔐 Cybersecurity
Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
HackerSploit Beginner 7y ago
Git, GitHub and source control: Is this even for network engineers? Hank Preston Explains: Part 1
🔐 Cybersecurity
Git, GitHub and source control: Is this even for network engineers? Hank Preston Explains: Part 1
David Bombal Beginner 7y ago
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
The Cyber Mentor Beginner 7y ago
DMitry - Passive Information Gathering
🔐 Cybersecurity
DMitry - Passive Information Gathering
HackerSploit Intermediate 7y ago
DNS Enumeration Tutorial - Dig, Nslookup & Host
🔐 Cybersecurity
DNS Enumeration Tutorial - Dig, Nslookup & Host
HackerSploit Beginner 7y ago
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
🔐 Cybersecurity
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
The Cyber Mentor Beginner 7y ago
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
🔐 Cybersecurity
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
The Complete VeraCrypt Encryption Tutorial
🔐 Cybersecurity
The Complete VeraCrypt Encryption Tutorial
HackerSploit Beginner 7y ago
Free CCNA VIRL Labs! Free VIRL Server from DevNet! Labs for CCNA | CCNP | Python | Ansible
🔐 Cybersecurity
Free CCNA VIRL Labs! Free VIRL Server from DevNet! Labs for CCNA | CCNP | Python | Ansible
David Bombal Beginner 7y ago
LIVE CTF! PART 1! - CS50 on Twitch, EP. 46
🔐 Cybersecurity
LIVE CTF! PART 1! - CS50 on Twitch, EP. 46
CS50 Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Leadership
📚 Coursera Course ↗
Self-paced
Leadership
Opens on Coursera ↗
Managing and Optimizing SD-Branch Networks
📚 Coursera Course ↗
Self-paced
Managing and Optimizing SD-Branch Networks
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Defend
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera ↗
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
📚 Coursera Course ↗
Self-paced
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
Opens on Coursera ↗
Incident Response Frameworks
📚 Coursera Course ↗
Self-paced
Incident Response Frameworks
Opens on Coursera ↗
Azure: Create a Virtual Machine and Deploy a Web Server
📚 Coursera Course ↗
Self-paced
Azure: Create a Virtual Machine and Deploy a Web Server
Opens on Coursera ↗