Here are the top 10 YouTube channels to learn ethical hacking:
Cyber Security with John Strand
This channel is a great resource for beginners and experienced hackers alike. John Strand covers a wide range of topics, from the basics of ethical hacking to advanced penetration testing techniques.
The Hackers Network
This channel is a community of hackers who share their knowledge and experiences. They have a wide range of videos on ethical hacking, including tutorials, interviews, and news updates.
NetworkChuck
This channel is a great resource for learning about networking and security. Chuck provides clear and concise explanations of complex topics.
Hacking with Josh
This channel covers a wide range of topics related to ethical hacking, including penetration testing, vulnerability assessment, and social engineering.
CyberMentor
This channel is a great resource for learning about ethical hacking and cybersecurity. They have a wide range of videos on topics such as network security, application security, and incident response.
LiveOverflow
This channel is a great resource for learning about vulnerability research and exploitation. They have a wide range of videos on topics such as buffer overflows, format string vulnerabilities, and web application vulnerabilities.
Null Byte
This channel is a great resource for learning about security tools and techniques. They have a wide range of videos on topics such as network scanning, forensics, and malware analysis.
Open Security Training
This channel is a great resource for learning about ethical hacking and cybersecurity. They have a wide range of videos on topics such as penetration testing, vulnerability assessment, and incident response.
Cybrary
This channel is a great resource for learning about a wide range of cybersecurity topics, including ethical hacking, penetration testing, and security awareness.
IT Security Guy
This channel is a great resource for learning about security news and updates. They also have a wide range of videos on topics such as vulnerability management, security best practices, and incident response.