Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cognitive behavioral therapy techniques for managing anxiety and improving mental health during challenging times, with insights from a People Program Manager.
Hacker101 is a collection of videos that will teach you everything you need to operate as a bug bounty hunter.
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Discover how bug bounty hunting can boost your cybersecurity career. Expert hackers share insights on skill development, networking, and leveraging experiences for future opportunities.
Explore VNC client vulnerabilities and learn how malicious servers can exploit them. Gain insights from an award-winning hacker on application security and sustainable DevSecOps practices.
Explore XSS sanitizer fuzzing techniques with Tom Anthony, from his hacking past to current cybersecurity insights. Learn about innovative approaches to discovering vulnerabilities in web applications.
Discover advanced techniques for application analysis in bug hunting with insights from a top-ranked researcher. Learn recon strategies and web app vulnerabilities to enhance your ethical hacking skills.
Explore unique vulnerabilities discovered by hacker Roni Carta, inspired by Arsene Lupin. Learn creative exploitation techniques and gain insights into the world of ethical hacking.
Learn insider tips for crafting high-quality bug bounty reports from Roy Davis, an experienced security researcher and manager of Zoom's Bug Bounty program. Gain valuable insights to improve your submissions.
Explore how TikTok's algorithm and user base are leveraged to introduce networking and security concepts to a wider audience through engaging short-form content.
Explore vulnerability research in office applications through fuzzing, code review, and reverse-engineering. Learn to discover and exploit zero-days, with insights on binary exploitation for curious researchers.
Learn to host Capture The Flag competitions, develop secure vulnerable applications, and set up robust infrastructure for large-scale events. Gain insights into challenge creation and security considerations.
Discover API keys hidden in web pages with the open-source TruffleHog Chrome extension. Learn how to use this tool and explore real-world examples of exposed keys in SaaS APIs with open CORS.
Exploring burnout in InfoSec, its impact on mental health, and strategies for better work-life balance. Discusses industry challenges and offers solutions for professionals, especially bug bounty hunters.
Explore Haptyc, a Python library enhancing Turbo Intruder with advanced fuzzing capabilities. Learn to create modular, reusable transforms for powerful and efficient HTTP request testing in web security assessments.
Get personalized course recommendations, track subjects and courses with reminders, and more.