Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn advanced Google search techniques to uncover hidden information and potential security vulnerabilities in websites and online systems.
Exploring advanced techniques for exploiting Microsoft IIS short file name disclosure vulnerabilities, with insights on enhancing web application security and ethical hacking strategies.
Explore PCI DSS compliance challenges and solutions in this informative talk. Gain insights into common issues, best practices, and strategies for effective implementation in your organization's payment card security.
Unveiling effective strategies for bug bounty programs, including common misconceptions, examples, and techniques like back matrixing to maximize success in the first 30 minutes.
Explore new insights into leaked secrets with Forager, a tool for uncovering sensitive information. Learn about its capabilities and implications for cybersecurity and ethical hacking.
Explore techniques for hacking root EPP servers to gain control of DNS zones. Learn about vulnerabilities in domain registry systems and potential impact on internet infrastructure.
Explore strategies for securing open-source dependencies in software development, emphasizing the importance of comprehensive security beyond just your own code.
Exploring the impact of GPT-based AI on security, this talk discusses potential disruptions, challenges, and opportunities in the cybersecurity landscape as AI technology advances.
Comprehensive guide to web application hacking resources, including platforms, tools, and learning materials for aspiring ethical hackers and bug bounty hunters.
Explore strategies for maintaining work-life balance, preventing burnout, and enhancing self-awareness in the cybersecurity field. Learn practical tips for managing stress and improving productivity.
Explore the Pwning Machine, an easy-to-setup hacking environment. Learn about its features, including a basic server, markdown editor, and pipeline runner for efficient cybersecurity tasks.
Explore web hacking techniques to exploit online games, leveraging existing web security knowledge for game vulnerabilities. Gain insights into adapting skills for game security testing.
Comprehensive guide on maximizing Amass tool for efficient information gathering and reconnaissance in cybersecurity, presented by expert Jeff Foley at NahamCon2020.
Explore automated attack surface discovery using Intrigue Core for efficient cybersecurity scaling. Learn techniques to identify vulnerabilities and enhance your security posture.
Explore email system vulnerabilities and exploitation techniques in this informative talk by @securinti, covering key security risks and potential attack vectors.
Get personalized course recommendations, track subjects and courses with reminders, and more.