Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Web Development
Data Analysis
Computer Networking
Arab-Islamic History: From Tribes to Empires
Fundamentals of Reinforcement Learning
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to secure Docker host OS and set up audit rules with HackerSploit's concise guide, including practical demonstrations. Less than 1-hour workload.
Learn to audit Docker platform security with HackerSploit's concise guide, featuring practical demonstrations and insights into Docker architecture. Less than 1-hour workload.
Learn to optimize Nmap scans for different network environments in under an hour with HackerSploit. Understand timing templates, parallelism, host group sizes, and more.
Learn to use Docker for pentesting and bug bounty hunting with HackerSploit. Understand how to set up Kali Linux, OWASP Juice Shop & Bug Bounty Toolkit on Docker in under an hour.
Learn to install and review CrunchBangPlusPlus, a Debian-based distro, in under an hour with HackerSploit. Explore its simplicity, performance, and Openbox window manager.
Learn DNS enumeration/reconnaissance using Dig, Nslookup & Host in less than an hour with HackerSploit.
HackerSploit offers a concise, less than 1-hour material on malware analysis using Ghidra, with a focus on Stuxnet analysis.
Learn to develop an Nmap scanner with Python3 in less than an hour with HackerSploit. The program covers installation, importing Nmap, and various scanning methods.
Explore QuasarRAT, a Remote Administration Tool for Windows, with HackerSploit. Learn about its features, requirements, and applications in under an hour.
Learn to use Shodan search engine to find specific types of computers connected to the internet with HackerSploit's under 1-hour material.
Learn to automate penetration testing using Linux utilities and ZSH plugins with HackerSploit's under 1-hour material.
Learn to set up, secure, and audit Linux servers with HackerSploit's concise guide on UFW and firewall rules, all in under an hour.
Learn to forward Snort logs to Splunk with HackerSploit's concise guide, mastering data analysis and system log monitoring in under an hour.
Learn to install and configure Snort 2 for intrusion detection in less than an hour with HackerSploit. Detect malicious network activity and notify relevant parties.
Get personalized course recommendations, track subjects and courses with reminders, and more.