Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to exploit 32-bit Windows buffer overflows through step-by-step guidance, from introduction to gaining shells, with practical techniques for cybersecurity enthusiasts.
Comprehensive guide to becoming an ethical hacker, covering foundational IT skills, networking, Linux, coding, and advanced topics like Active Directory and web application hacking. Includes certification advice and community resources.
Learn advanced web application hacking techniques using Caido.io, exploring vulnerabilities and enhancing your cybersecurity skills through hands-on demonstrations and expert insights.
Learn effective techniques for crafting compelling bug bounty reports that clearly communicate vulnerabilities, increase chances of acceptance, and maximize rewards from security programs.
Explore password security essentials: long passwords, Password Managers, and Multi-Factor Authentication. Learn how hackers guess passwords and discover NIST guidelines for robust password policies.
Insights into a hacker's journey, offering valuable lessons and advice for aspiring cybersecurity professionals. Learn from real-world experiences to accelerate your path in ethical hacking.
Explore XXE injection techniques for web application security, covering PortSwigger labs and practical hacking scenarios.
Learn hands-on techniques for exploiting blind SQL injection vulnerabilities with a practical lab demonstration and expert guidance on this critical web security issue.
Learn to identify, exploit, and defend against file inclusion vulnerabilities in web applications. Gain practical skills for ethical hacking and cybersecurity.
Learn to identify and exploit WordPress vulnerabilities through hands-on techniques like enumeration, plugin scanning, and user attacks in this comprehensive cybersecurity tutorial.
Comprehensive guide to Active Directory hacking techniques, from setup to advanced attacks. Learn essential tools and strategies for ethical penetration testing and cybersecurity.
Learn to exploit WordPress plugins through lab setup, enumeration techniques, and remote code execution in this hands-on cybersecurity tutorial.
Learn techniques for identifying vulnerabilities in IoT device firmware, enhancing your cybersecurity skills to protect against potential exploits in smart devices and embedded systems.
Learn to exploit Command Injection vulnerabilities with a comprehensive guide covering theory, code review, and hands-on labs to enhance your cybersecurity skills and understanding of this dangerous vulnerability.
Learn safe techniques for accessing and navigating the dark web, including using Tor and Tails for anonymity and security while exploring hidden online content.
Get personalized course recommendations, track subjects and courses with reminders, and more.