Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into detailed walkthroughs of 5 web security challenges from CTF@CIT, covering SQL injection, git repository exploitation, file read vulnerabilities, session tampering, and credential attacks.
Dive into detailed walkthroughs of Tsuku CTF web challenges, covering JSON injection, file disclosure, PRNG flaws, and YAML injection with WAF bypass techniques.
Discover essential tips and strategies for the OSWE certification exam, covering preparation resources, exam tactics, and practical insights for web security professionals.
Dive into web security exploitation through a CTF challenge walkthrough covering 403 bypass techniques, BentoML vulnerability analysis, and pickle deserialization for achieving remote code execution.
Dive into advanced web security exploitation, chaining DOM Clobbering, client-side path traversal, and Open Redirect vulnerabilities to achieve XSS in a CTF challenge walkthrough.
Master SQL injection techniques through hands-on exploitation of Portswigger's Gin and Juice shop, covering union and blind attacks, database enumeration, and automated tools like SQLMap and Burp Suite.
Master web security challenges through detailed walkthroughs of HackTheBox CTF 2024, covering API testing, SQL injection, JWT attacks, and various exploitation techniques for penetration testing.
Dive into advanced web security concepts through a CTF challenge walkthrough, exploring DOM clobbering, prototype pollution, and XSS exploitation techniques for penetration testing.
Dive into web security challenges from NahamCon CTF 2023, covering XSS attacks, domPDF exploitation, data hiding techniques, and SSTI vulnerabilities with practical demonstrations and beginner-friendly explanations.
Master binary exploitation techniques through a detailed walkthrough of the "Leek" pwn challenge, covering heap overflow attacks, chunk manipulation, and secret data extraction using practical examples and debugging tools.
Dive into web exploitation challenges from Space Heroes CTF, covering HTTP pollution, ChatGPT vulnerabilities, file upload security, XSS, and CSP bypass through practical demonstrations and beginner-friendly explanations.
Explore techniques for bypassing LLM security measures through linguistic manipulation, featuring hands-on challenges that demonstrate prompt injection, context manipulation, and sandbox escape methods.
Master penetration testing fundamentals through a hands-on walkthrough of the Funnel machine, covering enumeration, service discovery, password spraying, and port forwarding techniques for ethical hacking.
Master buffer overflow exploitation techniques through a practical ret2win challenge walkthrough with parameter handling and register manipulation in binary exploitation.
Dive into cryptographic vulnerabilities through a unique One-Time Pad challenge featuring Schrödinger's cat concept, exploring XOR operations and OTP reuse exploitation.
Get personalized course recommendations, track subjects and courses with reminders, and more.