Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive guide to web application vulnerabilities, covering OWASP Top 10, hands-on walkthroughs, and defense strategies. Learn to identify, exploit, and mitigate common security risks in web applications.
Explore common open-source vulnerabilities and learn effective mitigation strategies to enhance application security. Gain insights into identifying and addressing potential risks in your software.
Explore advanced features of Burp Suite Pro for ethical hacking and web application security testing. Learn powerful tools to enhance your penetration testing skills.
Learn to exploit SMB Relay attacks and gain remote access using Empire, enhancing your penetration testing skills and understanding of network security vulnerabilities.
Learn to create comprehensive and professional penetration testing reports, covering key elements like confidentiality, assessment overview, severity ratings, and technical findings.
Learn to crack Linux password hashes using Hashcat. Explore /etc/passwd and /etc/shadow files, combine them with unshadow, and use Hashcat to break passwords in this practical cybersecurity tutorial.
Learn essential Bash scripting for ethical hacking: grep, cut, tr, loops, and if statements. Create and improve a ping script while mastering Linux command-line tools for cybersecurity.
Master essential Linux commands for file system navigation, including pwd, ls, cd, mkdir, rm, cp, mv, and more.
Learn to build a basic network using Cisco Packet Tracer. Explore device options, construct a simple network, and gain hands-on experience with Cisco command line interface in this practical tutorial.
Learn to identify vulnerable commands in programs through spiking techniques for buffer overflow exploitation. Hands-on demonstration using Vulnserver and SPIKE scripts.
Discover offensive JavaScript techniques including keylogging, data exfiltration, password theft, and CSRF bypass in this concise tutorial on exploiting web vulnerabilities.
Learn to exploit vulnerabilities in ChatGPT-generated code, including SQL injection and cross-site scripting. Practical demonstrations enhance cybersecurity skills for ethical hacking and penetration testing.
Learn techniques for escalating privileges on Linux systems, including enumeration, kernel exploits, file permissions, sudo vulnerabilities, and SUID binaries. Gain practical skills through hands-on challenges.
Experience a day as an ethical hacker: explore cybersecurity tasks, tools, and techniques used to identify vulnerabilities and strengthen digital defenses in this insightful video.
Insider tips for landing cybersecurity jobs: resume crafting, interview preparation, and essential skills. Gain insights on standing out in a competitive field and advancing your career.
Get personalized course recommendations, track subjects and courses with reminders, and more.