Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
This path teaches the core concepts of local privilege escalation necessary for being successful against Windows and Linux systems. The path covers manual enumeration and exploitation and the use of tools to aid in the process.
Comprehensive training for aspiring penetration testers, covering essential concepts, tools, and methodologies for professional security assessments against enterprise-level infrastructure.
Comprehensive introduction to binary exploitation, covering assembly language, buffer overflows on Linux and Windows, and Python scripting for crafting exploits and automating tasks.
Comprehensive guide to mastering Linux and Windows operating systems, focusing on command-line proficiency, system management, and security best practices for information security professionals.
Comprehensive guide to Active Directory enumeration techniques, covering LDAP, PowerView, and BloodHound tools for identifying vulnerabilities and attack vectors in AD environments.
The Bug Bounty Hunter Job Role Path is for individuals who want to enter the world of Bug Bounty Hunting with little to no prior experience.
Get personalized course recommendations, track subjects and courses with reminders, and more.