Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore digital forensics and incident response using Velociraptor. Learn about VFS, artifacts, automation, process tracking, and hunting for compromised machines with practical demonstrations and expert insights.
Explore API security essentials, learn testing importance, and gain insights from industry experts. Discover practical tips for securing APIs and starting your journey in API hacking.
Comprehensive exploration of the Log4j vulnerability, including demonstrations of exploits in Minecraft, industry responses, and defensive strategies.
Comprehensive review of Offensive Security Exploit Developer certification, covering course content, exam preparation, and practical tips. Includes Q&A addressing common concerns for aspiring exploit developers.
Learn to use Snyk for finding and fixing vulnerabilities in web applications, including hands-on practice with a vulnerable app and a CTF challenge involving prototype pollution and RCE.
Comprehensive review of OSEP certification, covering exam preparation, note-taking strategies, report writing, and comparison with OSCP. Offers insights on course usefulness, timeline, and target audience.
Learn to classify malware using YARA rules, from setup to integration. Explore writing techniques, resources, and practical applications for effective malware analysis and detection.
Learn to pivot through networks using Chisel, covering setup, reconnaissance, static binaries, reverse connections, SOCKS proxies, and forward shells for effective network penetration.
Explore hands-on ransomware analysis with demos of RAASNet, Yashma, and Lockbit. Learn configuration, building, and detonation techniques from a malware analyst's perspective.
Explore Java deserialization vulnerabilities and create custom exploits for remote code execution in this hands-on tutorial, featuring practical examples and step-by-step guidance.
Learn filter evasion techniques for reverse shells, including code obfuscation and bypassing security measures, to enhance your penetration testing skills.
Explore MedusaLocker ransomware's behavior and tactics through dynamic analysis, gaining insights into its encryption process and file manipulation techniques.
Explore website scanning challenges and cybersecurity techniques with John Hammond. Learn about protective measures like Cloaking Firewall and gain insights into infrastructure security.
Explore self-extracting executables for hackers: creation, analysis, and implications. Gain insights into this cybersecurity technique for enhanced understanding and protection.
Hands-on practice with SQL injection techniques in a safe environment. Learn to identify and exploit vulnerabilities, enhancing your cybersecurity skills and understanding of database security.
Get personalized course recommendations, track subjects and courses with reminders, and more.