Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Walkthrough of Doggo CTF challenge, showcasing hacking techniques and problem-solving skills in a cybersecurity context. Includes partnership with Amazon and BugPOC.
Explore the similarities and differences between pentesting and bug bounty hunting, and learn how bug bounty experience can launch a career in pentesting. Gain insights from Phillip Wylie's expertise in cybersecurity.
Explore advanced techniques for integrating diverse data sources into the amass engine, enhancing its capabilities as a comprehensive reconnaissance tool for cybersecurity professionals.
Panel discussion exploring the importance of hacker communities, featuring insights from industry experts on fostering collaboration, knowledge sharing, and growth within the cybersecurity field.
Insights on crafting effective bug reports for quicker triage, based on experience as a triager. Learn to improve your reporting skills and expedite the bug bounty process.
Explore JWT vulnerabilities related to jku and x5u headers, understanding potential security risks and exploitation techniques in web applications.
Learn to create effective wordlists for ethical hacking using tools like Seclists and Bigquery. Enhance your penetration testing and bug bounty hunting skills with expert techniques.
Discover 7 essential tips for effective recon in bug bounty hunting, including automation, data analysis, and learning from others to improve your cybersecurity skills.
Discover how Frans Rosen achieved remote code execution on Apple through hot jar swapping. Learn about the research, exploit, and analysis behind this impressive security finding.
Explore techniques for reversing Web Assembly (wasm) in this offensive security talk. Learn key strategies and tools for analyzing and understanding wasm code.
Explore smart contract vulnerabilities, including re-entrancy attacks, delegatecall risks, and price oracle issues. Learn from real-world examples and gain insights into securing blockchain applications.
Discover effective blackbox monitoring techniques for timely bug detection in web applications. Learn task-based hybrid approaches, freshness indicators, and risk markers for improved security.
Dive into a critical smart contract vulnerability analysis, exploring a $600,000+ bug in Port Finance and learning how it was identified through a bug bounty program before potential exploitation.
Explore smart contract auditing through a real-world example, gaining insights into security practices and vulnerability detection in blockchain technology.
Insightful interview with @seclilc on her cybersecurity journey, covering hacking, reconnaissance, tools, work-life balance, and overcoming challenges in the field.
Get personalized course recommendations, track subjects and courses with reminders, and more.