Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Psychology
Cybersecurity
Project Management
How to Succeed at: Interviews
Improving Your Study Techniques
L'Italiano nel mondo
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn comprehensive malware analysis techniques, from environment setup to static analysis, PE header examination, and creating YARA rules. Gain practical skills through real-world examples like Stuxnet.
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Explore ChatGPT's applications in cybersecurity, from pentesting and shell generation to blue team strategies. Learn to leverage AI for enhanced security practices and automation.
Aprende a instalar y configurar BlackArch Linux para pruebas de penetración, incluyendo entornos de escritorio, resolución de pantalla y herramientas de VMware.
Learn Metasploit basics for penetration testing: explore modules, exploits, and payloads to enhance your cybersecurity skills and understand vulnerabilities.
Explore DNS enumeration, automated information gathering with Maltego, and leveraging Shodan for accessing routers, servers, and webcams in this comprehensive OSINT tutorial.
Learn to perform host discovery and vulnerability scanning using Nessus, a powerful proprietary tool. Gain practical skills in identifying network vulnerabilities and enhancing cybersecurity defenses.
Explore Wazuh SIEM for detecting and defending against cyber threats. Learn to collect, analyze, and respond to security events for effective blue team operations.
Learn to use custom and community Snort rules for effective intrusion detection. Discover how to capture network traffic, identify malicious activity, and set up logging and notifications for enhanced security.
Comprehensive tutorial series on web app penetration testing, covering tools, techniques, and real-world scenarios for identifying and exploiting vulnerabilities in web applications.
Learn web app penetration testing techniques using Burp Suite, including setup, brute force attacks, and CSRF vulnerability assessment.
Master Linux essentials for ethical hacking: file management, permissions, networking, security tools, and hands-on challenges to enhance your skills and protect systems effectively.
Learn to develop TCP servers, clients, and scanners using Python3 for penetration testing. Gain practical skills in network security and ethical hacking.
Learn to build a custom penetration testing distribution using open-source frameworks like PenTesters Framework and BlackArch repos. Covers tool installation on various Linux distributions.
Get personalized course recommendations, track subjects and courses with reminders, and more.