Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
The Bug Bounty Hunter Job Role Path is for individuals who want to enter the world of Bug Bounty Hunting with little to no prior experience.
This path teaches the core concepts of local privilege escalation necessary for being successful against Windows and Linux systems. The path covers manual enumeration and exploitation and the use of tools to aid in the process.
Comprehensive training for aspiring penetration testers, covering essential concepts, tools, and methodologies for professional security assessments against enterprise-level infrastructure.
Comprehensive introduction to binary exploitation, covering assembly language, buffer overflows on Linux and Windows, and Python scripting for crafting exploits and automating tasks.
Comprehensive guide to mastering Linux and Windows operating systems, focusing on command-line proficiency, system management, and security best practices for information security professionals.
Comprehensive guide to Active Directory enumeration techniques, covering LDAP, PowerView, and BloodHound tools for identifying vulnerabilities and attack vectors in AD environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.