ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

528 results

GhostStrats
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

In this video, we explore the fascinating world of quantum computing and how it will change the future of cybersecurity. Learn how ...

5:35
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

5,062 views

11 months ago

GhostStrats
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

In this video, I take you on a trip to Walmart to find the perfect budget-friendly laptop for your cybersecurity and privacy needs.

7:59
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

73,628 views

10 months ago

Cyber with Ben
How I Would Learn Cyber Security (If I Could Start Over)

Get $100 off Coursera Plus and learn from top industry experts! (Only valid until April 1st, 2024) https://imp.i384100.net/DK6baq ...

11:18
How I Would Learn Cyber Security (If I Could Start Over)

4,621 views

1 year ago

Nick
Python for Cybersecurity (Intermediate) Building your own Automated Vulnerability Scanner (Tutorial)

Learn how to build an automated vulnerability scanner in Python that detects insecure configurations in seconds. In this tutorial ...

19:32
Python for Cybersecurity (Intermediate) Building your own Automated Vulnerability Scanner (Tutorial)

123 views

3 months ago

ForeverAnonymous
CySA+ Exam Tips | How I Passed in Just 3 Days

Cybersecurity Career Resources Cybersecurity Career Builder Bundle (Notion Templates) Everything you need to crush your ...

10:59
CySA+ Exam Tips | How I Passed in Just 3 Days

5,771 views

5 months ago

GhostStrats
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

In this video, I explore the idea of building a ghost laptop — a system designed for maximum privacy and minimal traceability.

18:46
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

281,953 views

8 months ago

Cyber with Ben
5 ChatGPT Hacks That Will Land You a Job in Cybersecurity!

In this video I walk you through 5 different prompts that you can use to further your development in cybersecurity and job search!

12:41
5 ChatGPT Hacks That Will Land You a Job in Cybersecurity!

3,247 views

2 years ago

Cyber with Ben
I Passed the Security Blue Team Level 1 Exam

Check out the BTL1 here https://www.securityblue.team/why-btl1/ In this video, I share my honest review on the Security Blue ...

9:31
I Passed the Security Blue Team Level 1 Exam

36,807 views

1 year ago

Alex Chaveriat
How 15 years changed the way I scope penetration tests

After conducting hundreds of project kick-off calls, I found my favorite way to kick off penetration tests. Asking simple questions ...

5:18
How 15 years changed the way I scope penetration tests

853 views

5 years ago

Nick
Python for Cybersecurity (Beginners) Analyzing Server Logs for Suspicious Activity (Guided Tutorial)

Unlock the power of server logs and learn how cybersecurity experts spot suspicious activity! In this beginner-friendly tutorial, we ...

6:42
Python for Cybersecurity (Beginners) Analyzing Server Logs for Suspicious Activity (Guided Tutorial)

84 views

3 months ago

GhostStrats
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

This is a safety and awareness demo done only on hardware I own. I am not showing how to break into other people's computers.

5:10
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

16,289 views

3 months ago

ForeverAnonymous
How I Would Learn Cybersecurity If I Could Start Over #cybersecuritycareer

Cybersecurity Career Resources Cybersecurity Career Builder Bundle (Notion Templates) Everything you need to crush your ...

12:22
How I Would Learn Cybersecurity If I Could Start Over #cybersecuritycareer

552 views

8 months ago

PenTest
HackRF with Portapack H2M capture and replay SubGHz signals from two Flipper-Zeros

In this video a HackRF with Portapack is used to capture SubGHz chat from two Flipper-Zeros, then those signals are replayed in ...

7:02
HackRF with Portapack H2M capture and replay SubGHz signals from two Flipper-Zeros

2,158 views

1 year ago

GhostStrats
Bruce Who? Infiltra Now Installs in 60 Seconds on M5StickC Plus 2! Web Install & First Impressions!

In this video, I walk you through how to easily install the Infiltra firmware on your M5StickC Plus 2 using the newly available web ...

4:17
Bruce Who? Infiltra Now Installs in 60 Seconds on M5StickC Plus 2! Web Install & First Impressions!

25,830 views

9 months ago

GhostStrats
How I Made Simple HID Scripts Anyone Can Use – ZeroTrace Conversion & Demo Tutorial

In this video, I break down how to convert traditional HID scripts into the powerful ZeroTrace scripting language — super easy to ...

7:53
How I Made Simple HID Scripts Anyone Can Use – ZeroTrace Conversion & Demo Tutorial

1,821 views

8 months ago

Tebs Tech
Get a job in cybersecurity with hands on labs

Learn how to get a job in cybersecurity with hands-on labs. This video will cover the essential skills and knowledge you need to ...

5:57
Get a job in cybersecurity with hands on labs

366 views

1 year ago

GhostStrats
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

In this video, I take a bunch of hidden flash drives and transform them into powerful cybersecurity tools. Follow along as I walk you ...

5:35
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

10,860 views

10 months ago

The Staying Up Show
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

In this video, I describe how to leverage the social engineering tool kit on Callie Lennox installed on a 100% free Amazon EC2 ...

8:48
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

97 views

6 months ago

ForeverAnonymous
🔥 Top Programming Languages for Cybersecurity in 2026 (Python, C, C++, Rust & More)

Cybersecurity Career Resources Cybersecurity Career Builder Bundle (Notion Templates) Everything you need to crush your ...

8:03
🔥 Top Programming Languages for Cybersecurity in 2026 (Python, C, C++, Rust & More)

692 views

4 months ago

FEHA
PENETRATION TESTING = OPTIONAL ✅

In ISO 27001, the penetration testing is more into how you manage your vulnerability. Although it's not mandatory do but if you ...

4:10
PENETRATION TESTING = OPTIONAL ✅

28 views

10 months ago