Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover strategies for navigating corporate environments as a hacker, blending technical skills with business acumen to thrive in large organizations and advance your career.
Explore non-obvious vulnerabilities in Golang, Ruby, and Python, covering topics like Tempfile, path.Clean, URL parsing, and Unicode security implications.
Explore Softdocs' approach to safeguarding sensitive educational data through advanced cybersecurity measures, including penetration testing and bug bounty programs with Bugcrowd.
Practical insights for optimizing bug bounty programs, covering key aspects like stakeholder buy-in, program ownership, scope definition, and effective planning for cybersecurity success.
Explore crowdsourced security with industry pioneers, discussing its importance, future trends, and the motivations of bug bounty hunters in addressing sophisticated vulnerabilities.
Explore expert program management in crowdsourced security testing, focusing on bug bounties and vulnerability disclosure. Learn key strategies for successful implementation and management.
Streamline application security with Bugcrowd's Jira integration. Learn how to sync vulnerability data, facilitate faster remediation, and improve communication between security and development teams.
Explore key aspects of vulnerability disclosure programs, their industry impact, and why they're essential for modern cybersecurity strategies.
Explore key lessons from the Equifax breach, focusing on improving security feedback loops and implementing vulnerability disclosure programs to enhance cybersecurity strategies.
Explore critical security trends with industry experts, covering IoT vulnerabilities, crowdsourced testing, AI impacts, and evolving threats to prepare for the cybersecurity landscape of 2017.
Explore GraphQL security vulnerabilities, attack techniques, and protective measures. Learn to exploit implementation errors and misconfigurations in this popular API query language.
Explore common GSuite misconfigurations, prevention strategies, and bug hunting techniques. Learn about private docs, Google Sites, API vulnerabilities, and more from an experienced bounty hunter.
Explore common Android app vulnerabilities, their detection, and remediation. Learn about Google Play's security programs and essential resources for developers to enhance app security.
Explore hardware hacking fundamentals, fields, and affordable entry points. Learn about electronics, UART, JTAG, and car hacking with practical tips and resources for beginners.
Learn techniques to locate and identify sensitive data exposed in GitHub repositories, enhancing your cybersecurity skills for ethical hacking and vulnerability assessment.
Get personalized course recommendations, track subjects and courses with reminders, and more.