Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive guide to Burp Suite setup, methodology, and advanced features for effective white hat hacking and bug bounty hunting. Learn proxies, scanners, fuzzing, and targeting techniques.
Learn the fundamentals of Cross Site Scripting (XSS), including its history, types, and real-world examples. Explore best practices, advanced techniques, and tools for identifying and exploiting XSS vulnerabilities.
Explore crowdsourced security platforms with Rapyd and Bugcrowd experts. Learn evaluation strategies and insights from Rapyd's experience to enhance your organization's security approach.
Analysis of recent cyberattacks on major casino companies, exploring threat actors, breach methods, and implications for cybersecurity in the hospitality industry.
Explore hacker insights, AI's impact on cybersecurity, and industry trends with experts. Gain valuable perspectives on ethical hacking, motivations, and the evolving landscape of security research.
Explore various techniques for identifying information disclosure vulnerabilities, a diverse and intriguing category of security bugs with wide-ranging technical complexity.
Explore critical MOVEit vulnerabilities, their impact on organizations, and learn essential steps for identification, mitigation, and patching to protect sensitive data from ransomware attacks.
Explore types of access control and techniques to exploit vulnerabilities, enhancing your understanding of cybersecurity and potential system weaknesses.
Learn to set up and effectively use Burp Suite for web security testing in under 30 minutes, covering essential features and functionalities.
Explore hidden Windows DLL functionality, common bug patterns, and exploitation techniques for bug bounty hunters. Learn tools and methods to uncover vulnerabilities in web servers and network services.
Hands-on guide to extracting SPI flash contents from hardware devices, focusing on techniques and tools for bug bounty hunters to uncover valuable data and impactful vulnerabilities.
Explore techniques for accessing and extracting sensitive data from Android apps' internal storage, with tools and strategies for impactful bug bounty reports.
Discover strategies to minimize duplicate bug reports in bug bounty hunting, including developing expertise, exploring unique targets, and leveraging personal strengths.
Dive deeper into hunting Insecure Direct Object Reference (IDOR) vulnerabilities for significant rewards. Learn advanced techniques and strategies from expert Z-winK in this follow-up presentation.
Alissa Knight reveals tactics used to breach 55 financial institutions, offering insights into vulnerabilities in FinTech apps and APIs. Learn from a veteran hacker's experience in cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.