Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive introduction to ethical hacking, covering networking basics, Linux skills, Python programming, and initial stages of penetration testing. Ideal for aspiring cybersecurity professionals.
Comprehensive guide to becoming an ethical hacker, covering foundational IT skills, networking, Linux, coding, and advanced topics like web app and wireless hacking, certifications, and exploit development.
Learn to exploit buffer overflows with hands-on techniques including spiking, fuzzing, finding offsets, and generating shellcode. Gain practical skills for ethical hacking and cybersecurity.
Explore advanced SQL injections, participate in a giveaway, and engage in live bug bounty hunting. Learn practical techniques for web app testing and ethical hacking.
Comprehensive ethical hacking guide covering Linux, Python, OSINT, scanning, enumeration, exploitation, AD attacks, and more. Hands-on approach with practical tools and techniques for network penetration testing.
Comprehensive Linux tutorial for ethical hacking: VMWare setup, Kali Linux installation, system navigation, network commands, file management, services, tool updates, and Bash scripting.
Comprehensive guide to passive reconnaissance techniques and OSINT tools for ethical hacking, covering various methods to gather intelligence without direct interaction with target systems.
Comprehensive Python introduction covering basics to advanced topics, including practical projects like building a port scanner and shoe budget tool. Learn core concepts and apply them.
Learn hands-on techniques for exploiting blind SQL injection vulnerabilities with a practical lab demonstration and expert guidance on this critical web security issue.
Learn essential Bash scripting for ethical hacking: grep, cut, tr, loops, and if statements. Create and improve a ping script while mastering Linux command-line tools for cybersecurity.
Master essential Linux commands for file system navigation, including pwd, ls, cd, mkdir, rm, cp, mv, and more.
Learn to identify vulnerable commands in programs through spiking techniques for buffer overflow exploitation. Hands-on demonstration using Vulnserver and SPIKE scripts.
Explore remote code execution vulnerabilities in web applications, enhancing your ethical hacking skills and understanding of cybersecurity threats.
Learn techniques for escalating privileges on Linux systems, including enumeration, kernel exploits, file permissions, sudo vulnerabilities, and SUID binaries. Gain practical skills through hands-on challenges.
Experience a day as an ethical hacker: explore cybersecurity tasks, tools, and techniques used to identify vulnerabilities and strengthen digital defenses in this insightful video.
Get personalized course recommendations, track subjects and courses with reminders, and more.