Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive roadmap for new bug bounty hunters: boost knowledge, improve workflow, and achieve success in the first year. Tips for seasoned hackers included.
Learn the basics of machine learning and data science, explore AI's role in cybersecurity, and discover how to augment your practice with data. Ideal for beginners interested in applying AI to security challenges.
Explore techniques to identify open source libraries in obfuscated Android APKs and learn how common obfuscation methods can lead to vulnerable Java object deserialization, enhancing your bug bounty hunting skills.
Explore hardware hacking basics, areas, and entry points with hands-on demos. Learn essential concepts and discover resources for further practice in this engaging introduction to breaking and understanding hardware.
Explore CodeQL's power in bug bounty hunting and open-source security. Learn from @JLLeitschuh's experiences, vulnerability discoveries, and future plans for enhancing software security.
Explore automotive security vulnerabilities, from IoT to CAN bus hacking. Learn methodologies, attack surfaces, and bug prioritization for car hacking, covering infotainment systems, APIs, and mobile apps.
Learn strategies for selecting bug bounty targets, maintaining motivation during hacking, and deciding when to persist or move on. Gain insights from an experienced researcher on navigating the challenges of bug hunting.
Explore ethical hacking rights, challenges, and the importance of trust in infosec. Learn why community collaboration is crucial for encouraging ethical hacking and protecting vulnerabilities.
Expert recruiter shares insider tips for crafting standout resumes and advancing your infosec career, helping newcomers break into the cybersecurity industry and land their dream roles.
Enhance bug bounty hunting skills through decision-making techniques from emergency services. Learn to maximize impact, escalate findings, and make critical choices for bigger scopes and larger rewards.
Explore the personal journey and ethical considerations of offensive security work through the lens of a seasoned researcher, delving into its challenges, rewards, and societal impact.
Discover strategies for navigating corporate environments as a hacker, blending technical skills with business acumen to thrive in large organizations and advance your career.
Explore non-obvious vulnerabilities in Golang, Ruby, and Python, covering topics like Tempfile, path.Clean, URL parsing, and Unicode security implications.
Explore Softdocs' approach to safeguarding sensitive educational data through advanced cybersecurity measures, including penetration testing and bug bounty programs with Bugcrowd.
Practical insights for optimizing bug bounty programs, covering key aspects like stakeholder buy-in, program ownership, scope definition, and effective planning for cybersecurity success.
Get personalized course recommendations, track subjects and courses with reminders, and more.