Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to secure Docker host OS and set up audit rules for Docker artifacts. Covers best hosting OS, Linux audit framework, auditing tools, and includes practical demonstration.
Learn to audit Docker security using various tools, covering platform basics, architecture, security needs, and practical demonstrations for establishing a baseline security benchmark.
Optimize Nmap scans for different network environments. Learn timing templates, parallelism, host group sizes, timeouts, delays, and packet rates to enhance scanning efficiency and effectiveness.
Learn web app penetration testing techniques using Burp Suite, including setup, brute force attacks, and CSRF vulnerability assessment.
Master Linux essentials for ethical hacking: file management, permissions, networking, security tools, and hands-on challenges to enhance your skills and protect systems effectively.
Learn to develop TCP servers, clients, and scanners using Python3 for penetration testing. Gain practical skills in network security and ethical hacking.
Explore Linux persistence techniques using SSH keys, web shells, and cron jobs. Learn to maintain system access across restarts and credential changes for effective red team operations.
Explore techniques for elevating privileges on Linux systems using kernel exploits and misconfigured SUDO permissions. Learn essential skills for red team operations and penetration testing.
Comprehensive guide to password security, covering LastPass breach, secure password generation, storage, and management. Includes practical tips and tools for protecting personal information.
Explore lateral movement techniques on Windows using PsExec and RDP. Learn how adversaries pivot through systems to gain access and achieve objectives stealthily.
Explore Windows privilege escalation techniques, including UAC bypassing and kernel exploits. Learn adversarial methods to gain higher system permissions and enhance your cybersecurity skills.
Explore dynamic shellcode injection into executables and PowerShell obfuscation for Windows defense evasion. Learn advanced techniques to avoid detection during system compromise.
Comprehensive exploration of MITRE ATT&CK framework for cybersecurity professionals, covering implementation in offensive and defensive operations to enhance threat intelligence and security strategies.
Learn to create effective penetration testing reports: key components, best practices, and industry standards for clear communication of security findings and recommendations to stakeholders.
A penetration tester shares their journey into cybersecurity, highlighting key career milestones and experiences that led to becoming a professional in the field.
Get personalized course recommendations, track subjects and courses with reminders, and more.