Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to set up and effectively use Burp Suite for web security testing in under 30 minutes, covering essential features and functionalities.
Explore hidden Windows DLL functionality, common bug patterns, and exploitation techniques for bug bounty hunters. Learn tools and methods to uncover vulnerabilities in web servers and network services.
Hands-on guide to extracting SPI flash contents from hardware devices, focusing on techniques and tools for bug bounty hunters to uncover valuable data and impactful vulnerabilities.
Explore techniques for accessing and extracting sensitive data from Android apps' internal storage, with tools and strategies for impactful bug bounty reports.
Discover strategies to minimize duplicate bug reports in bug bounty hunting, including developing expertise, exploring unique targets, and leveraging personal strengths.
Dive deeper into hunting Insecure Direct Object Reference (IDOR) vulnerabilities for significant rewards. Learn advanced techniques and strategies from expert Z-winK in this follow-up presentation.
Alissa Knight reveals tactics used to breach 55 financial institutions, offering insights into vulnerabilities in FinTech apps and APIs. Learn from a veteran hacker's experience in cybersecurity.
Explore Salesforce Object Recon techniques with security researcher Kyle Benac. Learn valuable insights for enhancing your bug bounty and penetration testing skills in this informative presentation.
Explore the critical Log4Shell vulnerability, its impact, and mitigation strategies in this concise security briefing from Bugcrowd's expert.
Explore the critical Log4Shell vulnerability, its impact on Java systems, and essential mitigation strategies in this comprehensive security analysis.
Explore how offensive security has evolved from CVEs to TTPs, and learn to leverage built-in features for security testing and potential monetization through creating and sharing TTPs.
Comprehensive roadmap for new bug bounty hunters: boost knowledge, improve workflow, and achieve success in the first year. Tips for seasoned hackers included.
Learn the basics of machine learning and data science, explore AI's role in cybersecurity, and discover how to augment your practice with data. Ideal for beginners interested in applying AI to security challenges.
Explore techniques to identify open source libraries in obfuscated Android APKs and learn how common obfuscation methods can lead to vulnerable Java object deserialization, enhancing your bug bounty hunting skills.
Explore hardware hacking basics, areas, and entry points with hands-on demos. Learn essential concepts and discover resources for further practice in this engaging introduction to breaking and understanding hardware.
Get personalized course recommendations, track subjects and courses with reminders, and more.