Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about Cybersecurity by understanding Ethical Hacking, Open Source Intelligence, Web Application Hacking and Buffer overflows in these videos
Comprehensive guide to Kali Linux for ethical hacking, covering installation, system navigation, network commands, file management, and Bash scripting for cybersecurity professionals.
Aprende OSINT en 4.5 horas con técnicas de búsqueda avanzada, creación de sock puppets, análisis de datos EXIF, y OSINT en redes sociales como Twitter, Facebook e Instagram.
Explore TCP, UDP, subnetting, and network building with Cisco Packet Tracer. Master essential networking concepts for ethical hacking through practical challenges and hands-on exercises.
Comprehensive ethical hacking training covering advanced techniques like subdomain hunting, vulnerability scanning, exploitation, and buffer overflows. Includes hands-on practice with multiple virtual machines.
Comprehensive ethical hacking training covering networking, Linux, Python, reconnaissance, vulnerability scanning, exploitation, and hands-on practice with multiple target systems.
Explore how "Forgot Password" features can expose sensitive information, revealing potential security vulnerabilities in online platforms and the importance of robust data protection measures.
Learn techniques to track and locate online scammers, enhancing your cybersecurity skills and understanding of digital forensics methods.
Explore the value of IT certifications in the tech industry, weighing their importance against practical skills and experience for career advancement and job opportunities.
Quick introduction to Python programming basics, covering syntax, variables, data types, and simple operations in just 25 minutes.
Learn practical bug bounty hunting techniques, from web app security basics to advanced exploitation methods, with hands-on labs and real-world challenge walkthroughs.
Discover how to find command injection vulnerabilities in IoT devices through firmware analysis, reverse engineering with Ghidra, and practical exploitation techniques.
Master IT fundamentals through hands-on help desk scenarios and real-world troubleshooting techniques in this comprehensive 9-hour training program.
Master PowerShell for network threat hunting by detecting IOCs, analyzing suspicious connections with Netstat, correlating processes, and identifying malware beacons.
Master PowerShell techniques for investigating Windows processes during live endpoint examinations and incident response scenarios.
Get personalized course recommendations, track subjects and courses with reminders, and more.