Hackers Rest
  • Hacker's Rest
  • Tools & Cheatsheets
    • Cybersecurity YouTube Channels
  • Hacking Methodology
  • Hands-on Practice
  • Fundamentals
    • Network Fundamentals
    • Computer Fundamentals
  • Unix
    • Unix Fundamentals
    • Hardening & Setup
      • TMUX/Screen Cheatsheet
    • Red Team Notes
      • Enumeration
      • Getting Access
      • Privilege Escalation
      • Pivoting/Lateral Movement
      • Data Exfiltration
      • Persistence
    • Vim
  • Windows
    • Windows Fundamentals
    • PowerShell
    • Hardening & Setup
    • Red Team Notes
      • Enumeration
      • Getting Access
      • Privilege Escalation
      • Pivoting/Lateral Movement
      • Persistence
      • Data Exfiltration
      • Active Directory
        • Enumeration
        • Getting Access
        • Privilege Escalation
        • Persistence
      • Kerberos
      • Impacket
  • MacOS
    • MacOS Basics
    • Hardening & Configuration
    • Red Team Notes
      • Enumeration
      • Getting Access
      • Privilege Escalation
      • Persistence
  • Web
    • Burp Suite
    • DNS
    • Web Notes
      • Enumeration
      • Web Filter Bypass
      • Command Injection
      • Subdomain/Virtual Host Enumeration
      • The Web Application Hacker's Handbook
  • Mobile
    • iOS
    • Android
  • OS Agnostic
    • Basic Enumeration
    • Cryptography & Encryption
    • Network Hardware
    • OS Agnostic
    • OSINT
    • Password Cracking
      • Gathering the Hashes
      • Wordlist Manipulation
      • Cracking the Hashes
    • Pivoting
      • Chisel
      • Plink.exe
      • SSH
      • Sshuttle
      • Socat
    • Reverse Engineering & Binary Exploitation
      • Buffer Overflow
    • Scripting
      • Script Language Syntax
    • SQL
    • SSH & SCP
    • Steganography
    • Wireless
  • Unsorted
Powered by GitBook
On this page
  • Information Security YouTube Channels
  • Offensive Cybersecurity/Pentesting/Red Team YouTube channels
  • Defensive Cybersecurity/Blue Team YouTube channels
  • Malware Analysis
  • Digital Forensics & Incident Response (DFIR) YouTube channels
  • OSINT
  • Other IT/Cybersecurity-related YouTube channels
  • To be reviewed & sorted

Was this helpful?

Edit on GitHub
  1. Tools & Cheatsheets

Cybersecurity YouTube Channels

Information Security YouTube Channels

A collection of Cybersecurity Youtube channels I have come across. Not all have been vetted for content or quality at this time.

Offensive Cybersecurity/Pentesting/Red Team YouTube channels

  • IppSec

  • The Cyber Mentor

  • John Hammond

  • HackerOne

  • Hak5

  • Null byte

  • Hackersploit

  • STOK

  • David Bombal

  • Black Hat

  • DEFCONConference

  • Troy Hunt

  • Beau Bullock

  • Wild West Hackin' Fest

  • Antisyphon Training

  • Black Hills Information Security

  • Active Countermeasures

  • SANS Offensive Operations

Defensive Cybersecurity/Blue Team YouTube channels

  • SANS Cyber Defense

  • MITRE

Malware Analysis

  • hasherezade

  • Josh Stroschein

  • Wyatt Roersma

  • 0xf0x

  • MalwareAnalysisForHedgehogs

  • dist67

  • L!NK

  • OALabs

  • Colin Hardy

  • AGDC Services

  • MalwareAficionado

Digital Forensics & Incident Response (DFIR) YouTube channels

  • SANS Digital Forensics and Incident Response

  • 13Cubed

  • BlackPerl

  • Magnet Forensics

  • Learn Forensics with David Cowen

  • DFIR.Science

  • DFIR Podcast

  • Forensic Focus

  • Mobile Forensic Investigations

  • FIRST

  • Ryan Chapman

  • Sam Bowne

  • Alexis Brignoni

  • SecHubb

  • BlueMonkey 4n6

  • Cover6 Solutions

  • Ali Hadi

  • James Duffy

  • Michael Taggart

  • I.T Security Labs

OSINT

  • Trace Labs

  • The OSINT Curious Project

  • OSINT Dojo

  • Bendobrown

  • conINT

  • Layer 8 Conference

Other IT/Cybersecurity-related YouTube channels

  • SANS Institute

  • Professor Messer

  • NetworkChuck

  • CBT Nuggets

  • Gerald Auger – Simply Cyber

  • I.T. Career Questions

  • I.T. Career Skills

  • Du’An Lightfoot

  • Ask Nato Riley

  • Alpha Cyber Security

  • Cyber Warrior Studios

  • Cybersecurity Meg

  • Dion Training

  • Cyber Secrets

  • Codenstein

  • Infosec

  • danscourses

  • IT Certification and Training

  • CYBERINSIGHT

  • InfoSec Pat

  • GynvaelEN

  • IT Dojo

  • SecKC

  • JackkTutorials

  • Mark E.S. Bernard

  • NetSecNow

  • SheHacksPurple

  • SSTec Tutorials

  • The Shadow Brokers

  • Yes, I Know IT !

  • Free Training

  • Technocalypse Now

  • Master I.T.

  • RSA Conference

To be reviewed & sorted

  • InsiderPHD

  • Rana Khalil

  • Spin the hack

  • PwnFunction

  • Cyber Sec Village

  • Farah Hawa

  • Stefan Rows

  • I.T Security Labs

  • Cybr

  • The XSS Rat

  • Cristi Vlad

  • PinkDraconian

  • Elevate Cyber

  • Forensic Tech

  • ScriptKiddieHub - Tadi

  • zSecurity

  • Jon Good

  • Ankit Chauhan

  • Cybersecurity Web

  • 247CTF

  • Motasem Hamdan

  • I.T. Career Questions

  • Hacksplained

  • Bug Bounty Reports Explained

  • TechChip

  • Technical Navigator

  • Beau Knows Tech... Stuff

  • CyberSecurityTV

  • CYBER EVOLUTION

  • Nahamsec

  • The cyber expert

  • Loi Liang Yang

  • DarkSec

  • superhero1

  • CrytoCar

  • Cybercdh

  • Zanidd

  • Seytonic

  • LiveOverflow

  • SecurityFWD

  • CryptoKnight

  • Computerphile

  • FindingUrPasswd

  • Bitten tech

  • Busra Demir

  • Cyber Academy

  • Cyberspatial

  • Techlore

  • Derek Rook

  • GynvaelEN

  • Ethical Hacking School

  • Pratik Dabhi

  • MrTurvey

  • BugCrowd

  • MurmusCTF

  • EC Council

  • Pentest-Tools Com

  • The Hackers World

  • Grant Collins

  • Infinite Logins

  • Hacking Simplified

  • Calle Svensson

  • ehacking

  • Masters in I.T

  • Info CK

  • PhD Security

  • Cyber Insecurity

  • Tech69

  • Cloud Security Podcast

  • Hussein Nasser

PreviousTools & CheatsheetsNextHacking Methodology

Last updated 2 years ago

Was this helpful?