Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Information Technology
Communication Skills
Python
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introduction to Linux
Financial Markets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a cybersecurity expert's journey, from beginnings to CIA keynote. Gain insights into career paths, challenges, and opportunities in this rapidly evolving field of information security.
Comprehensive walkthrough of Active Directory exploitation techniques on TryHackMe platform, covering reconnaissance, privilege escalation, and lateral movement strategies.
Engaging talk sharing real-world pentesting experiences and favorite hacking techniques. Offers valuable insights for cybersecurity professionals and aspiring ethical hackers.
Hands-on walkthrough of buffer overflow exploitation on TryHackMe's Brainstorm challenge, demonstrating practical ethical hacking techniques for cybersecurity enthusiasts.
Step-by-step walkthrough of the HackPark challenge on TryHackMe, demonstrating ethical hacking techniques and Windows privilege escalation methods.
Learn to create a powerful pentest dropbox for remote network access and security testing, enhancing your ethical hacking toolkit and capabilities.
Learn efficient subnetting techniques to quickly calculate network addresses, broadcast addresses, and available host ranges for IPv4 networks.
Explore Hack the Box's Netmon challenge in this penetration testing tutorial. Learn practical ethical hacking techniques and strategies for identifying and exploiting vulnerabilities in network systems.
Learn to automate reconnaissance tasks using Bash scripting, enhancing efficiency in ethical hacking. Covers tools like Sublist3r, httprobe, nmap, and Eyewitness for streamlined information gathering.
Learn techniques for discovering and exploiting third-level domains in bug bounty programs using tools like sublist3r, eyewitness, and nmap, along with custom regex for automation.
Explore top 5 internal network hacking techniques, including LLMNR poisoning, SMB relay attacks, and kerberoasting. Learn live demonstrations and mitigation strategies for each method.
Learn ethical hacking techniques through a hands-on walkthrough of the "Bashed" challenge on HackTheBox, focusing on penetration testing skills for beginners.
Learn penetration testing techniques on the Optimum machine from HackTheBox, focusing on practical skills for ethical hacking and cybersecurity.
Explore advanced web app testing techniques including XXE, input validation, broken access control, and XSS. Enhance your ethical hacking skills and learn to identify critical vulnerabilities.
Explore XSS, SQL injection, and broken access control in web app testing. Learn to identify and exploit these vulnerabilities to enhance your cybersecurity skills.
Get personalized course recommendations, track subjects and courses with reminders, and more.