Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
HackerSploit's online program offers a comprehensive guide to malware analysis, from setting up a sandbox environment to creating YARA rules. Duration: 3-4 hours.
HackerSploit offers a 1-2 hour training on BlackArch Linux installation, configuration for penetration testing, and VMware tools usage.
Learn to use ChatGPT for cybersecurity with HackerSploit's concise guide, covering pentesting, generating shells, fuzzing, and more in under an hour.
Learn Metasploit basics from HackerSploit in under an hour. Ideal for beginners, this program covers security vulnerabilities, penetration testing, and IDS signature development.
DNS Enumeration Tutorial - Dig, Nslookup & Host.Maltego - Automated Information Gathering.Information Gathering With Shodan.Shodan Search Engine Tutorial - Access Routers,Servers,Webcams + Install CLI.
Learn to perform host discovery and vulnerability scanning with Nessus in less than an hour with HackerSploit.
Learn web app penetration testing with HackerSploit's 12-hour program. Master tools like Burp Suite, ZAP, and OWASP Juice Shop, and explore topics from brute force to XSS and SQL injection.
Linux Essentials: Curl Fundamentals. UFW Firewall (Uncomplicated Firewall) - Complete Tutorial. How To Clear Tracks & Logs On Linux.SSH Brute Force Protection With Fail2Ban.How To Create Your Own Pentesting Distribution.
Learn Python3 for penetration testing with HackerSploit. Develop TCP servers, clients, Nmap scanners, port scanners, and banner grabbing scripts in 1-2 hours.
Learn web app penetration testing with HackerSploit in under an hour, including setting up Burp Suite and understanding CSRF.
Learn to set up your own penetration testing distribution using open-source frameworks with HackerSploit. Less than 1-hour material.
HackerSploit offers a concise guide on securing Docker daemon with TLS encryption and user namespaces, including a practical demonstration. Less than 1-hour workload.
Learn to secure Docker host OS and set up audit rules with HackerSploit's concise guide, including practical demonstrations. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.