Cyber Work Applied image

Learn cybersecurity — for free!

Get FREE cybersecurity training from industry experts

New training sent to your inbox every week.

1,000s of students

1,000s of students

New episodes every week

New episodes every week

Hands-on education

Hands-on education

Cybersecurity training videos

  • MITRE ATT&CK
    Locked
    New

    Executing the Sandworm APT with MITRE ATT&CK

    Published on: November 23, 2021

    Learn the techniques the Sandworm APT hacking group used to compromise, pivot from and destroy a server. Then try to do it yourself.

  • MITRE ATT&CK
    Locked

    Pivoting with proxy chains with MITRE ATT&CK

    Published on: November 9, 2021

    Learn how adversaries leverage hardware to pivot into a protected network. Then try it yourself and master these MITRE ATT&CK® techniques.

  • MITRE ATT&CK
    Locked

    Reconnaissance and resource development with MITRE ATT&CK

    Published on: October 26, 2021

    Learn the MITRE ATT&CK® techniques adversaries use for reconnaissance and resource development. Then try it yourself in our cyber range.

  • MITRE ATT&CK
    Locked

    How to use the MITRE ATT&CK matrix

    Published on: October 12, 2021

    The MITRE ATT&CK® enterprise matrix outlines how real-world adversaries operate. Use it to help develop your team's cybersecurity skills.

  • Demo
    Locked

    How to configure a network firewall

    Published on: September 28, 2021

    Learn the basics of setting up a network firewall, including stateful vs. stateless firewalls, setting up access control lists and more.

  • Demo
    Locked

    4 network utilities every security pro should know

    Published on: September 14, 2021

    Command line utilities are useful in a variety of scenarios. Learn how, and when, you can use Ping, Netstat, Traceroute and ARP.

  • Demo
    Locked

    How to use Nmap and other network scanners

    Published on: August 24, 2021

    What's on your network, or someone else's? Use free network scanning tools like Nmap, Zenmap and advanced port scanner and find out.

  • Demo
    Locked

    How to use Wireshark for protocol analysis

    Published on: August 10, 2021

    Learn how to analyze network traffic with the free protocol analyzer Wireshark and sniffing tool tcpdump. Then try it yourself!

  • Demo
    Locked

    Password security: Using Active Directory password policy

    Published on: July 27, 2021

    How do you enforce a secure password policy? Learn how to implement Windows local and group password policies in this episode.

  • Overview
    Locked

    Identification, authorization and authentication

    Published on: July 13, 2021

    Someone's trying to gain access, but are they who they say they are? That's what the different methods of identification are all about.

  • Demo
    Locked

    Wi-Fi password hack: How to hack into WPA Wi-Fi (and WPA2)

    Published on: June 29, 2021

    In this demo of a Wi-Fi WPA key hack, you'll learn how to use Aircrack-ng and Airodump-ng to access 802.11 WPA and WPA2 connections.

  • Demo
    Locked

    Using password cracking tools: How to crack a password

    Published on: June 15, 2021

    Learn how to use the Cain and Abel password cracker to conduct both a brute-force password attack and a password dictionary attack.

  • Overview
    Locked

    Hashing basics: How does hashing work?

    Published on: June 1, 2021

    What is password hashing? How does a one-way hash function work? Mike Meyers uses his sophisticated hashing box to explain in this episode.

  • Overview
    Locked

    Cryptography basics: How does encryption work?

    Published on: May 18, 2021

    Learn cryptography basics — from Caesar and Vigenere ciphers to cryptography algorithms and encrypting data using public and private keys.

  • Cyberattack
    Locked

    Extortion: How attackers double down on threats

    Published on: May 4, 2021

    You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand, pay up now — or it’s only going to get worse.

  • Cyberattack
    Locked

    How cross-site scripting attacks work

    Published on: April 20, 2021

    Cross-site scripting attacks use insecure web apps to send malicious code to users — leading to account compromise, data loss and more.

  • Cyberattack
    Locked

    Inside a DDoS attack against a bank

    Published on: April 2, 2021

    Distributed denial-of-service attacks are often used to disrupt websites. Learn how one bank got attacked and what they did to stop it.

  • Cyberattack
    Locked

    How injection attacks work

    Published on: March 22, 2021

    Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.

  • Overview
    Locked

    How to use the Infosec Skills platform

    Published on: March 9, 2021

    Get access to 100s of additional hands-on skill and certification courses with Infosec Skills — FREE when you use code LEARN.

  • Overview
    Locked

    5 ways to prevent APT ransomware attacks

    Published on: February 23, 2021

    Advanced Persistent Threat groups involvement in ransomware campaigns have made them nearly unstoppable. Learn how you can slow them down.

  • Social Engineering
    Locked

    Using AI to level up your phishing attacks

    Published on: February 9, 2021

    See a live demo of a phishing attack, and learn how cybercriminals are using AI to make them more effective — and more dangerous.

  • Demo
    Locked

    Write a port scanner in Python in 5 minutes

    Published on: January 26, 2021

    Port scanners are an essential network security tool. Open up your Linux terminal and learn how to write one using basic Python — right now.

  • Cyberattack
    Locked

    Connecting a malicious thumb drive

    Published on: January 12, 2021

    Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?

  • Data breach
    Locked

    Inside Capital One’s game-changing breach

    Published on: January 5, 2021

    The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.

  • Demo
    Locked

    How to set up a man-in-the-middle attack

    Published on: December 22, 2020

    Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.

  • Social Engineering
    Locked

    How Zoom is being exploited for phishing

    Published on: December 15, 2020

    Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.

  • Careers
    Locked

    Getting started in cybersecurity

    Published on: December 1, 2020

    Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.

  • Demo
    Locked

    How to carry out a watering hole attack

    Published on: November 10, 2020

    You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.

  • Data breach
    Locked

    Inside Equifax’s massive breach

    Published on: November 9, 2020

    Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.

  • Overview
    Locked

    Cloud computing: What you need to know

    Published on: November 7, 2020

    How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.