Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Information Technology
Communication Skills
Python
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introduction to Linux
Financial Markets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive guide to passive reconnaissance techniques and OSINT tools for ethical hacking, covering various methods to gather intelligence without direct interaction with target systems.
Comprehensive walkthrough of exploiting HackTheBox's Fighter, covering reconnaissance, web exploitation, privilege escalation, and reverse engineering techniques for ethical hacking practice.
Learn comprehensive web application penetration testing techniques, from enumeration to advanced exploits, with hands-on practice and real-world bug bounty hunting scenarios.
Learn ethical hacking through hands-on practice with 10 beginner-friendly penetration testing episodes, covering various vulnerabilities and exploitation techniques.
Comprehensive network penetration testing course covering Linux, Python, OSINT, scanning tools, enumeration, exploitation, Active Directory attacks, and more for aspiring ethical hackers.
Learn essential Linux commands for ethical hacking, from basic file system navigation to advanced scripting, preparing you for penetration testing and cybersecurity challenges.
Learn to exploit 32-bit Windows buffer overflows through step-by-step guidance, from introduction to gaining shells, with practical techniques for cybersecurity enthusiasts.
Comprehensive guide to becoming an ethical hacker, covering foundational IT skills, networking, Linux, coding, and advanced topics like Active Directory and web application hacking. Includes certification advice and community resources.
Learn advanced web application hacking techniques using Caido.io, exploring vulnerabilities and enhancing your cybersecurity skills through hands-on demonstrations and expert insights.
Learn effective techniques for crafting compelling bug bounty reports that clearly communicate vulnerabilities, increase chances of acceptance, and maximize rewards from security programs.
Learn to exploit vulnerabilities in ChatGPT-generated code, including SQL injection and cross-site scripting. Practical demonstrations enhance cybersecurity skills for ethical hacking and penetration testing.
Learn techniques for escalating privileges on Linux systems, including enumeration, kernel exploits, file permissions, sudo vulnerabilities, and SUID binaries. Gain practical skills through hands-on challenges.
Experience a day as an ethical hacker: explore cybersecurity tasks, tools, and techniques used to identify vulnerabilities and strengthen digital defenses in this insightful video.
Insider tips for landing cybersecurity jobs: resume crafting, interview preparation, and essential skills. Gain insights on standing out in a competitive field and advancing your career.
Explore OSINT techniques to locate Rudolph using social media, reverse image search, EXIF data analysis, and breach databases. Learn practical cybersecurity skills for digital investigations.
Get personalized course recommendations, track subjects and courses with reminders, and more.