Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Software Development
Exploring English: Language and Culture
Marketing Digital: Content & Community Manager
Perdón y reconciliación: cómo sanar heridas
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to secure Docker host OS and set up audit rules with HackerSploit's concise guide, including practical demonstrations. Less than 1-hour workload.
Learn to audit Docker platform security with HackerSploit's concise guide, featuring practical demonstrations and insights into Docker architecture. Less than 1-hour workload.
Learn to optimize Nmap scans for different network environments in under an hour with HackerSploit. Understand timing templates, parallelism, host group sizes, and more.
Learn to set up, secure, and audit Linux servers with HackerSploit's concise guide on UFW and firewall rules, all in under an hour.
Learn to use Docker for pentesting and bug bounty hunting with HackerSploit. Understand how to set up Kali Linux, OWASP Juice Shop & Bug Bounty Toolkit on Docker in under an hour.
Learn to install and review CrunchBangPlusPlus, a Debian-based distro, in under an hour with HackerSploit. Explore its simplicity, performance, and Openbox window manager.
Learn DNS enumeration/reconnaissance using Dig, Nslookup & Host in less than an hour with HackerSploit.
HackerSploit offers a concise, less than 1-hour material on malware analysis using Ghidra, with a focus on Stuxnet analysis.
Learn to develop an Nmap scanner with Python3 in less than an hour with HackerSploit. The program covers installation, importing Nmap, and various scanning methods.
Explore QuasarRAT, a Remote Administration Tool for Windows, with HackerSploit. Learn about its features, requirements, and applications in under an hour.
Learn to use Shodan search engine to find specific types of computers connected to the internet with HackerSploit's under 1-hour material.
Learn to automate penetration testing using Linux utilities and ZSH plugins with HackerSploit's under 1-hour material.
Learn Windows Red Team persistence techniques with PowerShell Empire in less than an hour with HackerSploit. Gain skills in maintaining persistent access to Windows targets.
Learn to identify and exploit vulnerabilities on a Linux server hosting a web application with HackerSploit. Less than 1 hour of material.
Get personalized course recommendations, track subjects and courses with reminders, and more.