Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into web security exploitation through a CTF challenge walkthrough covering 403 bypass techniques, BentoML vulnerability analysis, and pickle deserialization for achieving remote code execution.
Discover essential tips and strategies for the OSWE certification exam, covering preparation resources, exam tactics, and practical insights for web security professionals.
Discover how to identify and analyze DocuSign scams through a real-world example, including malware detection techniques, URL verification, and sandbox analysis for better cybersecurity awareness.
Discover reverse engineering techniques through a CTF challenge involving binary analysis, network traffic capture, and HMAC-based serial key generation.
Dive into advanced web security exploitation, chaining DOM Clobbering, client-side path traversal, and Open Redirect vulnerabilities to achieve XSS in a CTF challenge walkthrough.
Master SQL injection techniques through hands-on exploitation of Portswigger's Gin and Juice shop, covering union and blind attacks, database enumeration, and automated tools like SQLMap and Burp Suite.
Master web security challenges through detailed walkthroughs of HackTheBox CTF 2024, covering API testing, SQL injection, JWT attacks, and various exploitation techniques for penetration testing.
Dive into advanced web security concepts through a CTF challenge walkthrough, exploring DOM clobbering, prototype pollution, and XSS exploitation techniques for penetration testing.
Dive into web security challenges from NahamCon CTF 2023, covering XSS attacks, domPDF exploitation, data hiding techniques, and SSTI vulnerabilities with practical demonstrations and beginner-friendly explanations.
Master binary exploitation techniques through a detailed walkthrough of the "Leek" pwn challenge, covering heap overflow attacks, chunk manipulation, and secret data extraction using practical examples and debugging tools.
Dive into web exploitation challenges from Space Heroes CTF, covering HTTP pollution, ChatGPT vulnerabilities, file upload security, XSS, and CSP bypass through practical demonstrations and beginner-friendly explanations.
Explore techniques for bypassing LLM security measures through linguistic manipulation, featuring hands-on challenges that demonstrate prompt injection, context manipulation, and sandbox escape methods.
Master penetration testing fundamentals through a hands-on walkthrough of the Funnel machine, covering enumeration, service discovery, password spraying, and port forwarding techniques for ethical hacking.
Master buffer overflow exploitation techniques through a practical ret2win challenge walkthrough with parameter handling and register manipulation in binary exploitation.
Dive into cryptographic vulnerabilities through a unique One-Time Pad challenge featuring Schrödinger's cat concept, exploring XOR operations and OTP reuse exploitation.
Get personalized course recommendations, track subjects and courses with reminders, and more.