Courses from 1000+ universities
A human analysis of financial documents reveals what AI content farms missed: Duolingo’s GenAI features are undermining its own profit margins.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Computer Networking
Introduction to Cyber Security
Competencias para buscar, mantener y promocionar en un empleo
Mining Massive Datasets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn ReactJS fundamentals, explore create-react-app tools, and master import/export concepts for efficient web development.
Master Java's printf() method and format specifiers to enhance your output formatting capabilities, including flags, width, precision, and essential syntax patterns.
Master essential StringBuilder methods in Java including capacity, append, insert, delete, substring, replace, and reverse through hands-on demonstrations and practical examples.
Explore SMB protocol, enumerate vulnerable Linux machines, and exploit Samba servers using Metasploit Framework's samba_symlink_traversal module. Gain insights into SMB security risks.
Explore Hydra and Hydra Graphical tools for cracking FTP login passwords on vulnerable Linux machines. Learn effective password cracking techniques.
Learn essential file handling in Java with Scanner class - from creating objects and reading data types to implementing error handling and following best practices.
Master MySQL database exploitation techniques using Metasploit's auxiliary modules, including version detection, login attacks, enumeration, and hash dumping in a controlled lab environment.
Discover how to identify and exploit Network File System vulnerabilities through hands-on demonstrations using Kali Linux and Metasploitable 2 in a controlled environment.
Master John the Ripper's password cracking modes: Single Crack for quick individual hashes, Wordlist for efficient pre-generated lists, and Incremental for systematic brute-force attempts.
Explore ARP spoofing: its mechanics, targets, consequences, and prevention. Learn to safeguard your network against this malicious technique that disrupts communication and intercepts data.
Explore Metasploit Auxiliary modules, including TCP port scanners, FTP login, and SSH tools. Learn practical techniques for network reconnaissance and vulnerability assessment.
Exploit VSFTPD 2.3.4 using Metasploit Framework. Learn basic commands and practical exploitation techniques in this hands-on demonstration.
Explore React's core concepts: Virtual DOM, diffing algorithm, state management, and useState hook for efficient UI updates and component state handling.
Explore key concepts of React Router v6 including BrowserRouter, Routes, Route, Link, and Outlet. Learn practical implementation through hands-on demonstrations.
Learn essential React concepts: functional components, JSX, styling, and props. Master building efficient and reusable UI elements for modern web applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.