Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack3rcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore Katana, a portable pentesting toolkit, covering its GUI, bootable menu, documentation, and ideal uses. Learn about Forge setup, antivirus considerations, and BIOS restrictions.
Learn essential prepping strategies for economic crises, including currency alternatives, defense, bug-out plans, and sustainable food sources. Practical tips for building resilience in uncertain times.
Explore Linux exploit development, covering buffer overflows, shellcode, and mitigation techniques. Hands-on labs and practical examples enhance understanding of system vulnerabilities and security concepts.
Explore password cracking techniques using Amazon EC2, covering hashing algorithms, methodology tools, and cloud-based strategies for efficient and cost-effective password recovery.
Learn essential hacking survival skills for various scenarios, including financial collapse and government failure. Explore technologies like ham radio, packet radio, and HSMM-MESH to stay connected in challenging times.
Learn to exploit vulnerabilities by analyzing security patches and reverse engineering, with techniques for identifying and leveraging weaknesses in software systems.
Learn social engineering techniques for ethical hacking, including methodology, role development, and relationship building. Gain practical insights for successful penetration testing and security assessments.
Explore advanced phishing tactics, including spear phishing, email harvesting, and payload selection. Learn why user awareness isn't enough and how to limit exposure through network segmentation.
Explore DNS reconnaissance techniques for ethical hacking, including zone transfers, brute-forcing, cache snooping, and data parsing. Learn to gather valuable network information effectively.
Discover creative problem-solving techniques inspired by MacGyver, enhancing your ability to improvise and think outside the box in hacking and security scenarios.
Explore electromagnetic pulse (EMP) technology, its potential impacts, and defensive measures in this comprehensive presentation by Adrian Crenshaw at Hack3rcon 3.
Learn essential Bash scripting techniques for penetration testing, enhancing your cybersecurity toolkit with automation and efficiency.
Learn essential strategies for running a successful consulting business in the cybersecurity industry, including client management, pricing, and business development.
Learn network traffic analysis techniques, including packet inspection and protocol analysis, to enhance your cybersecurity skills and detect potential threats.
Learn network traffic analysis fundamentals, including packet capture, protocol analysis, and traffic monitoring techniques to enhance your cybersecurity skills and detect network threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.