Channel Avatar

That Cyber Guy Official @UC2N-xI3DgZ6B4qTUMKKn85g@youtube.com

820 subscribers - no pronouns :c

Want to learn FREE hands-on cybersecurity? Our tutorials wil


22:55
HTML & CSS Crash Course: How to style an HTLM Form in 2025?
15:20
Introduction to HTML For Complete Beginners | Create an HTML Form in 2025?
07:42
Setting Up a Secure Web Development Environment | XAMPP & Sublime Text Programming for Cybersecurity
03:56
Scan Any Domain Name and Website with Nikto | Kali Linux and Metasploitable Vulnerability Scanning
04:45
Scan for Open Ports on Any Website with NetCat | The Ultimate Kali Linux Tool
05:57
How To Avoid a Support Scam? Apple and Microsoft Support Scams || Scammers Exposed!
03:25
Mastering Nmap: Advanced Network Reconnaissance Techniques for Cybersecurity Pros
06:54
The Ultimate Kali Linux Toolkit for Beginners |Scanning Servers With Zenmap, Nmap and Metasploitable
03:55
How to Know if Your Email Address HAS BEEN COMPROMISED | HACKERS EXPOSED!
03:32
How HACKERS Crack Your Password? In Just 3 Minutes | How to Create Strong Passwords?
07:55
I Graduated Debt-Free! | How I Earned 3 Degrees for Under $10,000 | Getting into I.T. in 2025?
05:56
How to Learn Cybersecurity For FREE in 2025? TOP 5 FREE Cybersecurity Platform | Boost Your Career
06:13
HACKERS EXPOSED! How to Spot Phishy URLs & Malicious Files | Virustotal Tutorial & urlscan.io
05:25
How Hackers Find Information About Your System! Nmap Scanning Demo With Kali Linux, Metasploitable
07:00
What is Ransomware? How Do I Protect myself Against Ransomware? The $400 Million Cybercrime Empire
06:04
How to FIX INTERNET CONNECTION ISSUES? Troubleshoot Your Internet Connection using CMD command
13:23
Scan for vulnerabilities on Web Servers using Nmap | Kali Linux, Metasploitable and Metasploitable
08:13
Updated! How to Scan Hidden Network in Kali Linux With Nmap and Metasploitable?
08:13
How To Scan Hidden Network in Kali Linux With Nmap and Metasploitable?
07:31
How To Remove Viruses, Malware on Your Computer?
08:56
Create Unbreakable Passwords: Tips to Secure Your Online Identity From Hackers in 2024
08:31
How Hackers Steal Your Passwords|How to Protect Yourself from Phishing Attack,SEToolkit, Kali Linux
05:09
How Hackers Exploit Open Ports: A Must-Know for Security Pros
05:28
How to Scan the Internet: Masscan Tutorial | Kali Linux
05:50
Test Your Cybersecurity Knowledge in 5 minutes: Cyber Quiz
06:29
Vulnerability Management: GRC with TheCIS Benchmarks and STIG
05:30
Bug Bounty Hunting 101: A Beginner's Guide (2024)
07:14
Web Security Testing: Scanning Any Website with Nikto on Kali Linux | Web Vulnerability Scanner
10:54
Kali Linux Terminal Customization in 10 Minutes!
05:57
Free Vulnerability Scanning Tools You Need Now! Network Scanning in Ethical Hacking Made Easy
07:30
Networking Tutorial For Beginners: TCP, UDP, HTTP, and WebSockets Explained with Wireshark!
04:48
Scan for Vulnerabilities on Any Website and Web Servers using Nikto | Kali Linux and Metasploitable
04:16
How to Download Nikto on Kali Linux in VirtualBox? Web Vulnerability Scanner Tutorial
04:52
Burp Suite Tutorial | A Step-by-Step Guide to Finding Vulnerabilities like a Pro in Kali Linux
03:49
Zenmap Nmap GUI Basic Features: Made Easy with Kali Linux and Metasploitable
06:30
Zenmap vs Nmap Tutorial: Finding Vulnerabilities Made easy with Kali Linux and Metasploitable
07:07
Nmap Tutorial: Finding Vulnerabilities Made Easy with Kali Linux and Metasploitable
07:10
Network Monitoring and management with Wireshark | Kali Linux
05:40
How to scan any website for vulnerabilities with Kali Linux?
03:57
What is a Web Application Firewall (WAF)? Kali Linux wafw00f WAF Made Easy
06:29
Solved! How to Fix Noapic Error for Metasploitable in VirtualBox (Kernel Panic Error) Permanent fix.
09:47
Nessus Vulnerability Scanner Tutorial: Finding Hidden Vulnerabilities
13:33
Install Nessus for Free and scan for Vulnerabilities | The Ultimate Scanner Guide in Kali Linux
06:01
Defend Against AI-Powered Cyber Threats: 10 Essential Tips
04:56
What is port scanning, and how does it work? Scan Port with Kali Linux, Nmap, and Metasploitable
09:52
Do I Need a College Degree to Work In Cybersecurity in 2024?
06:36
What is DNS Domain Name System? How DNS works?
11:13
What is a Brute Force Attack? | A Practical Demonstration with Kali Linux and Metasploitable
11:41
What is SQL injection: DVWA Exploits with Kali Linux & Metasploitable | Web Security Tutorial
09:34
Mastering XSS Attacks: DVWA Exploits with Kali Linux & Metasploitable | Web Security Tutorial
06:36
5G Network and IoT Security: Kali Linux and Shodan | Networking Fundamentals
17:13
Networking Fundamentals | Troubleshoot Network Connection, with Kali Linux, Metasploitable, Windows
12:45
Networking Fundamentals | Network Security, Learn Firewall, TLS, and VPN, Kali Linux, Metasploitable
08:22
How I Broke Into Cybersecurity? An Immigrant’s Journey.
09:39
The Ultimate Cyber Security Resume Review | How to Get Noticed by Top Tech Companies?
09:17
What is the OSI Model? A Practical Wireshark Demonstration with Kali Linux and Metasploitable
11:35
Networking Fundamentals | TCP/IP, UPD, QUIC, and HTTP Explained with Kali Linux
10:31
Get started in Cybersecurity 2024: The Ultimate Guide To Learning Cybersecurity
15:54
Networking Fundamentals | Subnetting Tutorial for beginners, IP addresses, and subnet masks
06:36
Networking Fundamentals | What is an IP Address? All You Need to Know