Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Information Technology
Communication Skills
Python
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introduction to Linux
Financial Markets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn web app testing techniques including enumeration, UI bypassing, and XSS through hands-on challenges. Gain practical skills in using Burp Suite and understanding common vulnerabilities.
Learn practical pentesting techniques using Apache Tomcat, Burp Suite, and reverse shells. Explore default credentials, enumeration, and post-exploitation strategies for enhancing your ethical hacking skills.
Learn practical pentesting techniques for the Devel machine, including scanning, enumeration, payload generation, and privilege escalation, with hands-on demonstrations and expert guidance.
Learn web app enumeration techniques including subdomain discovery, vulnerability scanning, and using tools like Burp Suite and Nikto to identify potential security weaknesses.
Learn to exploit the MS17-010 vulnerability using Metasploit and AutoBlue, covering scanning, exploitation, payload types, and post-exploitation techniques in a hands-on penetration testing tutorial.
Learn to enumerate and exploit SMB vulnerabilities on a Linux machine, with practical demonstrations of scanning, exploitation, and post-exploitation techniques for ethical hacking.
Comprehensive ethical hacking guide covering Linux, Python, OSINT, scanning, enumeration, exploitation, AD attacks, and more. Hands-on approach with practical tools and techniques for network penetration testing.
Comprehensive Linux tutorial for ethical hacking: VMWare setup, Kali Linux installation, system navigation, network commands, file management, services, tool updates, and Bash scripting.
Learn advanced penetration testing techniques including file transfers, pivoting, and report writing. Gain insights on maintaining access, cleanup, legal considerations, and career advice in cybersecurity.
Comprehensive tutorial on exploiting MS17-010, GPP/cPasswords, and Kerberoasting, followed by an extensive Q&A session covering various cybersecurity topics and career advice for aspiring pentesters.
Explore advanced Active Directory exploitation techniques including NTLM relay, token impersonation, and pass-the-hash attacks. Learn practical skills for penetration testing and network security.
Learn to build an Active Directory lab, perform LLMNR poisoning attacks, and crack NTLMv2 hashes using Hashcat. Gain hands-on experience with Windows Server, domain setup, and common penetration testing techniques.
Comprehensive tutorial on exploitation techniques, including reverse shells, credential stuffing, and live hacking demonstrations. Includes Q&A session covering various cybersecurity career topics and personal insights.
Learn enumeration techniques for penetration testing using Kioptrix and Hack The Box. Covers network discovery, vulnerability scanning, and port enumeration. Includes Q&A on various cybersecurity topics and career advice.
Comprehensive tutorial on penetration testing tools and techniques, covering Nmap, Nessus, Metasploit, and BurpSuite. Includes practical demonstrations, Q&A session, and industry insights for aspiring cybersecurity professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.