Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Project Management
Digital Marketing
Data Analysis
Forensic Facial Reconstruction: Finding Mr. X
Project Management: The Basics for Success
Design Patterns
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from H@cktivitycon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Discover how bug bounty hunting can boost your cybersecurity career. Expert hackers share insights on skill development, networking, and leveraging experiences for future opportunities.
Explore VNC client vulnerabilities and learn how malicious servers can exploit them. Gain insights from an award-winning hacker on application security and sustainable DevSecOps practices.
Discover advanced techniques for application analysis in bug hunting with insights from a top-ranked researcher. Learn recon strategies and web app vulnerabilities to enhance your ethical hacking skills.
Explore vulnerability research in office applications through fuzzing, code review, and reverse-engineering. Learn to discover and exploit zero-days, with insights on binary exploitation for curious researchers.
Learn to host Capture The Flag competitions, develop secure vulnerable applications, and set up robust infrastructure for large-scale events. Gain insights into challenge creation and security considerations.
Discover API keys hidden in web pages with the open-source TruffleHog Chrome extension. Learn how to use this tool and explore real-world examples of exposed keys in SaaS APIs with open CORS.
Exploring burnout in InfoSec, its impact on mental health, and strategies for better work-life balance. Discusses industry challenges and offers solutions for professionals, especially bug bounty hunters.
Explore Haptyc, a Python library enhancing Turbo Intruder with advanced fuzzing capabilities. Learn to create modular, reusable transforms for powerful and efficient HTTP request testing in web security assessments.
Discover the evolution of bug bounty hunting over five years, exploring successful techniques, favorite vulnerabilities, and lessons learned to help you replicate success in ethical hacking.
Explore the value of infosec certifications with industry experts, discussing preparation strategies, career impact, and essential skills for success in the cybersecurity field.
Explore diverse paths to cybersecurity careers, from CTFs to bug bounties. Learn key strategies for success, including self-teaching, building a unique skill set, and leveraging your online presence as a resume.
Explore CodeQL's static and taint analysis capabilities to uncover vulnerabilities, including potential RCE flaws. Learn key concepts for effective code analysis and security testing.
Explore cutting-edge techniques for bug hunters and red teamers to discover and expand attack surfaces, focusing on domain reconnaissance, subdomain enumeration, and IP space analysis.
Engaging tales of successful penetration testing, showcasing diverse attack vectors and vulnerabilities. Highlights include exploiting lack of MFA, IPv6 abuse, and overcoming robust security measures.
Discover one hacker's journey from novice to Most Valuable Hacker, exploring tools, resources, challenges, and strategies for success in bug bounty hunting without coding skills.
Get personalized course recommendations, track subjects and courses with reminders, and more.