Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from H@cktivitycon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Discover how bug bounty hunting can boost your cybersecurity career. Expert hackers share insights on skill development, networking, and leveraging experiences for future opportunities.
Explore VNC client vulnerabilities and learn how malicious servers can exploit them. Gain insights from an award-winning hacker on application security and sustainable DevSecOps practices.
Discover advanced techniques for application analysis in bug hunting with insights from a top-ranked researcher. Learn recon strategies and web app vulnerabilities to enhance your ethical hacking skills.
Explore unique vulnerabilities discovered by hacker Roni Carta, inspired by Arsene Lupin. Learn creative exploitation techniques and gain insights into the world of ethical hacking.
Learn insider tips for crafting high-quality bug bounty reports from Roy Davis, an experienced security researcher and manager of Zoom's Bug Bounty program. Gain valuable insights to improve your submissions.
Explore how TikTok's algorithm and user base are leveraged to introduce networking and security concepts to a wider audience through engaging short-form content.
Explore vulnerability research in office applications through fuzzing, code review, and reverse-engineering. Learn to discover and exploit zero-days, with insights on binary exploitation for curious researchers.
Learn to host Capture The Flag competitions, develop secure vulnerable applications, and set up robust infrastructure for large-scale events. Gain insights into challenge creation and security considerations.
Discover API keys hidden in web pages with the open-source TruffleHog Chrome extension. Learn how to use this tool and explore real-world examples of exposed keys in SaaS APIs with open CORS.
Exploring burnout in InfoSec, its impact on mental health, and strategies for better work-life balance. Discusses industry challenges and offers solutions for professionals, especially bug bounty hunters.
Explore Haptyc, a Python library enhancing Turbo Intruder with advanced fuzzing capabilities. Learn to create modular, reusable transforms for powerful and efficient HTTP request testing in web security assessments.
Discover the evolution of bug bounty hunting over five years, exploring successful techniques, favorite vulnerabilities, and lessons learned to help you replicate success in ethical hacking.
Explore the value of infosec certifications with industry experts, discussing preparation strategies, career impact, and essential skills for success in the cybersecurity field.
Explore diverse paths to cybersecurity careers, from CTFs to bug bounties. Learn key strategies for success, including self-teaching, building a unique skill set, and leveraging your online presence as a resume.
Explore CodeQL's static and taint analysis capabilities to uncover vulnerabilities, including potential RCE flaws. Learn key concepts for effective code analysis and security testing.
Get personalized course recommendations, track subjects and courses with reminders, and more.