Hackers Rest
  • Hacker's Rest
  • Tools & Cheatsheets
    • Cybersecurity YouTube Channels
  • Hacking Methodology
  • Hands-on Practice
  • Fundamentals
    • Network Fundamentals
    • Computer Fundamentals
  • Unix
    • Unix Fundamentals
    • Hardening & Setup
      • TMUX/Screen Cheatsheet
    • Red Team Notes
      • Enumeration
      • Getting Access
      • Privilege Escalation
      • Pivoting/Lateral Movement
      • Data Exfiltration
      • Persistence
    • Vim
  • Windows
    • Windows Fundamentals
    • PowerShell
    • Hardening & Setup
    • Red Team Notes
      • Enumeration
      • Getting Access
      • Privilege Escalation
      • Pivoting/Lateral Movement
      • Persistence
      • Data Exfiltration
      • Active Directory
        • Enumeration
        • Getting Access
        • Privilege Escalation
        • Persistence
      • Kerberos
      • Impacket
  • MacOS
    • MacOS Basics
    • Hardening & Configuration
    • Red Team Notes
      • Enumeration
      • Getting Access
      • Privilege Escalation
      • Persistence
  • Web
    • Burp Suite
    • DNS
    • Web Notes
      • Enumeration
      • Web Filter Bypass
      • Command Injection
      • Subdomain/Virtual Host Enumeration
      • The Web Application Hacker's Handbook
  • Mobile
    • iOS
    • Android
  • OS Agnostic
    • Basic Enumeration
    • Cryptography & Encryption
    • Network Hardware
    • OS Agnostic
    • OSINT
    • Password Cracking
      • Gathering the Hashes
      • Wordlist Manipulation
      • Cracking the Hashes
    • Pivoting
      • Chisel
      • Plink.exe
      • SSH
      • Sshuttle
      • Socat
    • Reverse Engineering & Binary Exploitation
      • Buffer Overflow
    • Scripting
      • Script Language Syntax
    • SQL
    • SSH & SCP
    • Steganography
    • Wireless
  • Unsorted
Powered by GitBook
On this page
  • Information Security YouTube Channels
  • Offensive Cybersecurity/Pentesting/Red Team YouTube channels
  • Defensive Cybersecurity/Blue Team YouTube channels
  • Malware Analysis
  • Digital Forensics & Incident Response (DFIR) YouTube channels
  • OSINT
  • Other IT/Cybersecurity-related YouTube channels
  • To be reviewed & sorted

Was this helpful?

Edit on GitHub
  1. Tools & Cheatsheets

Cybersecurity YouTube Channels

PreviousTools & CheatsheetsNextHacking Methodology

Last updated 2 years ago

Was this helpful?

Information Security YouTube Channels

A collection of Cybersecurity Youtube channels I have come across. Not all have been vetted for content or quality at this time.

Offensive Cybersecurity/Pentesting/Red Team YouTube channels

Defensive Cybersecurity/Blue Team YouTube channels

Malware Analysis

Digital Forensics & Incident Response (DFIR) YouTube channels

OSINT

Other IT/Cybersecurity-related YouTube channels

To be reviewed & sorted

IppSec
The Cyber Mentor
John Hammond
HackerOne
Hak5
Null byte
Hackersploit
STOK
David Bombal
Black Hat
DEFCONConference
Troy Hunt
Beau Bullock
Wild West Hackin' Fest
Antisyphon Training
Black Hills Information Security
Active Countermeasures
SANS Offensive Operations
SANS Cyber Defense
MITRE
hasherezade
Josh Stroschein
Wyatt Roersma
0xf0x
MalwareAnalysisForHedgehogs
dist67
L!NK
OALabs
Colin Hardy
AGDC Services
MalwareAficionado
SANS Digital Forensics and Incident Response
13Cubed
BlackPerl
Magnet Forensics
Learn Forensics with David Cowen
DFIR.Science
DFIR Podcast
Forensic Focus
Mobile Forensic Investigations
FIRST
Ryan Chapman
Sam Bowne
Alexis Brignoni
SecHubb
BlueMonkey 4n6
Cover6 Solutions
Ali Hadi
James Duffy
Michael Taggart
I.T Security Labs
Trace Labs
The OSINT Curious Project
OSINT Dojo
Bendobrown
conINT
Layer 8 Conference
SANS Institute
Professor Messer
NetworkChuck
CBT Nuggets
Gerald Auger – Simply Cyber
I.T. Career Questions
I.T. Career Skills
Du’An Lightfoot
Ask Nato Riley
Alpha Cyber Security
Cyber Warrior Studios
Cybersecurity Meg
Dion Training
Cyber Secrets
Codenstein
Infosec
danscourses
IT Certification and Training
CYBERINSIGHT
InfoSec Pat
GynvaelEN
IT Dojo
SecKC
JackkTutorials
Mark E.S. Bernard
NetSecNow
SheHacksPurple
SSTec Tutorials
The Shadow Brokers
Yes, I Know IT !
Free Training
Technocalypse Now
Master I.T.
RSA Conference
InsiderPHD
Rana Khalil
Spin the hack
PwnFunction
Cyber Sec Village
Farah Hawa
Stefan Rows
I.T Security Labs
Cybr
The XSS Rat
Cristi Vlad
PinkDraconian
Elevate Cyber
Forensic Tech
ScriptKiddieHub - Tadi
zSecurity
Jon Good
Ankit Chauhan
Cybersecurity Web
247CTF
Motasem Hamdan
I.T. Career Questions
Hacksplained
Bug Bounty Reports Explained
TechChip
Technical Navigator
Beau Knows Tech... Stuff
CyberSecurityTV
CYBER EVOLUTION
Nahamsec
The cyber expert
Loi Liang Yang
DarkSec
superhero1
CrytoCar
Cybercdh
Zanidd
Seytonic
LiveOverflow
SecurityFWD
CryptoKnight
Computerphile
FindingUrPasswd
Bitten tech
Busra Demir
Cyber Academy
Cyberspatial
Techlore
Derek Rook
GynvaelEN
Ethical Hacking School
Pratik Dabhi
MrTurvey
BugCrowd
MurmusCTF
EC Council
Pentest-Tools Com
The Hackers World
Grant Collins
Infinite Logins
Hacking Simplified
Calle Svensson
ehacking
Masters in I.T
Info CK
PhD Security
Cyber Insecurity
Tech69
Cloud Security Podcast
Hussein Nasser