Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Data Analysis
Computer Science
Financial Markets
CS50's Introduction to Computer Science
Functional Foods and Nutraceuticals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from H@cktivitycon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore unconventional recon techniques for bug bounty programs, focusing on out-of-scope assets to uncover unique vulnerabilities in core applications.
Discover the evolution of bug bounty hunting over five years, exploring successful techniques, favorite vulnerabilities, and lessons learned to help you replicate success in ethical hacking.
Explore the value of infosec certifications with industry experts, discussing preparation strategies, career impact, and essential skills for success in the cybersecurity field.
Explore diverse paths to cybersecurity careers, from CTFs to bug bounties. Learn key strategies for success, including self-teaching, building a unique skill set, and leveraging your online presence as a resume.
Explore CodeQL's static and taint analysis capabilities to uncover vulnerabilities, including potential RCE flaws. Learn key concepts for effective code analysis and security testing.
Explore cutting-edge techniques for bug hunters and red teamers to discover and expand attack surfaces, focusing on domain reconnaissance, subdomain enumeration, and IP space analysis.
Engaging tales of successful penetration testing, showcasing diverse attack vectors and vulnerabilities. Highlights include exploiting lack of MFA, IPv6 abuse, and overcoming robust security measures.
Discover one hacker's journey from novice to Most Valuable Hacker, exploring tools, resources, challenges, and strategies for success in bug bounty hunting without coding skills.
Strategies to recognize, overcome, and prevent burnout in the tech industry. Learn to balance work and personal life, manage stress, and maintain well-being for long-term success.
Comprehensive guide to becoming a pentester, covering essential skills, knowledge, and steps for pursuing a career in ethical hacking, based on expert experience and mentorship.
Explore Web Cache Deception attacks, including new "Path Confusion" techniques. Learn about vulnerabilities, exploitation methods, and the challenges of remediation in this cybersecurity deep dive.
Explore advanced techniques for bypassing Web Application Firewalls (WAFs) and demonstrating the impact of cross-site scripting vulnerabilities, even in the presence of sophisticated security measures.
Explore common technical attacks on email systems and real-world examples from bug bounty programs, enhancing your understanding of email security beyond spam and phishing.
Explore car hacking techniques, from 'IVI in a box' to 'CAR in a box', with insights on safely experimenting without damaging your own vehicle. Learn from real-world experiences and practical tips.
Discover how bug bounty hunting can boost your cybersecurity career. Expert hackers share insights on skill development, networking, and leveraging experiences for future opportunities.
Get personalized course recommendations, track subjects and courses with reminders, and more.