Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Python
Digital Marketing
English for Career Development
Inglés empresarial: ventas, gestión y liderazgo
Crisis Resource Management
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about Cybersecurity by understanding Ethical Hacking, Open Source Intelligence, Web Application Hacking and Buffer overflows in these videos
Comprehensive guide to Kali Linux for ethical hacking, covering installation, system navigation, network commands, file management, and Bash scripting for cybersecurity professionals.
Explore TCP, UDP, subnetting, and network building with Cisco Packet Tracer. Master essential networking concepts for ethical hacking through practical challenges and hands-on exercises.
Explore how "Forgot Password" features can expose sensitive information, revealing potential security vulnerabilities in online platforms and the importance of robust data protection measures.
Learn techniques to track and locate online scammers, enhancing your cybersecurity skills and understanding of digital forensics methods.
Comprehensive ethical hacking training covering advanced techniques like subdomain hunting, vulnerability scanning, exploitation, and buffer overflows. Includes hands-on practice with multiple virtual machines.
Aprende OSINT en 4.5 horas con técnicas de búsqueda avanzada, creación de sock puppets, análisis de datos EXIF, y OSINT en redes sociales como Twitter, Facebook e Instagram.
Learn comprehensive web application penetration testing techniques, from enumeration to advanced exploits, with hands-on practice and real-world bug bounty hunting scenarios.
Learn ethical hacking through hands-on practice with 10 beginner-friendly penetration testing episodes, covering various vulnerabilities and exploitation techniques.
Comprehensive network penetration testing course covering Linux, Python, OSINT, scanning tools, enumeration, exploitation, Active Directory attacks, and more for aspiring ethical hackers.
Learn essential Linux commands for ethical hacking, from basic file system navigation to advanced scripting, preparing you for penetration testing and cybersecurity challenges.
Learn to exploit 32-bit Windows buffer overflows through step-by-step guidance, from introduction to gaining shells, with practical techniques for cybersecurity enthusiasts.
Comprehensive tutorial on exploitation techniques, including reverse shells, credential stuffing, and live hacking demonstrations. Includes Q&A session covering various cybersecurity career topics and personal insights.
Learn enumeration techniques for penetration testing using Kioptrix and Hack The Box. Covers network discovery, vulnerability scanning, and port enumeration. Includes Q&A on various cybersecurity topics and career advice.
Comprehensive tutorial on penetration testing tools and techniques, covering Nmap, Nessus, Metasploit, and BurpSuite. Includes practical demonstrations, Q&A session, and industry insights for aspiring cybersecurity professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.