Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Communication Skills
Artificial Intelligence
Psychology
Direct Tax Laws and Practice
Introduction to Biology - The Secret of Life
ODS en la Agenda 2030 de las Naciones Unidas:Â Retos de los Objetivos de Desarrollo Sostenible
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack3rcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore Katana, a portable pentesting toolkit, covering its GUI, bootable menu, documentation, and ideal uses. Learn about Forge setup, antivirus considerations, and BIOS restrictions.
Learn essential prepping strategies for economic crises, including currency alternatives, defense, bug-out plans, and sustainable food sources. Practical tips for building resilience in uncertain times.
Explore Linux exploit development, covering buffer overflows, shellcode, and mitigation techniques. Hands-on labs and practical examples enhance understanding of system vulnerabilities and security concepts.
Explore password cracking techniques using Amazon EC2, covering hashing algorithms, methodology tools, and cloud-based strategies for efficient and cost-effective password recovery.
Learn essential hacking survival skills for various scenarios, including financial collapse and government failure. Explore technologies like ham radio, packet radio, and HSMM-MESH to stay connected in challenging times.
Comprehensive workshop on utilizing Backtrack for ethical hacking and penetration testing, covering essential tools and techniques for cybersecurity professionals.
Explore penetration testing strategies, business impact, IT management, and social engineering in this comprehensive cybersecurity discussion.
Explore automated Man-in-the-Middle attack techniques for network security testing, focusing on efficient methods to intercept and analyze network traffic.
Discover strategies to enhance your Twitter presence and leverage it for career advancement in cybersecurity, with insights on gaining followers and expanding your influence.
Explore network monitoring systems, focusing on high-speed packet capture, frame processing, and tuning techniques for FreeBSD and Linux. Learn about PF_RING, netmap, and useful applications.
Explore shadow copies for malware analysis and recovery with Tim Tomes and Mark Baggett. Learn techniques for Linux and Windows, including manual demos and VSS commands.
Explore password security flaws, cracking techniques, and policy improvements. Learn from breaches, analyze user behavior, and discover tools for enhancing password protection.
Explore OSINT techniques for competitive intelligence, covering tools and strategies to gather information on companies, networks, and individuals through various online sources.
Explore online poker vulnerabilities, from random number generation to web app security, and learn how to exploit them for enhanced gameplay and protection.
Explore perimeter security vulnerabilities and learn effective strategies to strengthen your network's defenses against external threats and attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.