Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Information Technology
Digital Marketing
Six Sigma Part 1: Define and Measure
Know Thyself - The Value and Limits of Self-Knowledge: The Examined Life
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ethical Wi-Fi hacking using Manjaro on Raspberry Pi 400. Learn about tools, techniques, and best practices for capturing handshakes, changing MAC addresses, and cracking passwords.
Comprehensive weekly cybersecurity update covering various topics including vanity URL attacks, Clearview AI developments, and emerging threats, providing insights for security professionals and enthusiasts.
Weekly cybersecurity update covering latest hacking tools, ESP32-S3 release, QR code exploits, ransomware attacks, and global cyber threats. Gain insights on emerging vulnerabilities and defense strategies.
Learn to upload hacking projects to ESP8266 microcontrollers using only a browser, making it easy for beginners to load binaries onto devices like the WiFi Nugget without command-line knowledge.
Learn to visualize Wi-Fi network data collected by drones using Python, Google Colab, and Jupyter notebooks. Explore techniques for mapping, clustering, and identifying specific devices.
Extend Wi-Fi range using a $3 ESP8266 microcontroller. Learn to modify Arduino examples for custom access points and explore two network extension methods.
Explore advanced Android hacking techniques with Nick Godshall, covering emulation, access control vulnerabilities, and device exploitation across various Android platforms.
Explore Android device hacking using Android Studio with Nick Godshall. Learn emulation techniques, tackle DIVA challenges, and understand responsible disclosure in this comprehensive tutorial.
Comprehensive demonstration of a ransomware attack, covering setup, exploitation techniques, data theft, and defense strategies. Includes discussions on hacking tools, ethics, and cybersecurity career insights.
Explore Android device hacking using Android Studio. Learn emulation, user agent tracking, reverse engineering, API tokens, decompilation, and SQL injection techniques.
Prepare for the CISSP exam with Mike, covering key topics like incident response, patch management, security operations, and threat modeling in this comprehensive study session.
Explore Pentoo, a Gentoo-based Linux distribution for pentesting. Learn installation, features, and tools like Airgeddon in this comprehensive overview of the security-focused OS.
Explore Fedora, a secure Linux distribution with SELinux, ideal for security-aware developers. Learn installation, setup, package management, and even WiFi hacking in this comprehensive guide.
Explore Ubuntu as a hacking OS: learn to harden the system, install hacking tools, and understand Linux forks. Gain insights on Ubuntu's advantages and practical installation in virtual environments.
Explore OpenBSD: A secure UNIX-like OS. Learn installation, benefits, and potential uses. Discover its focus on security, server capabilities, and limitations for certain applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.