Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cognitive behavioral therapy techniques for managing anxiety and improving mental health during challenging times, with insights from a People Program Manager.
Hacker101 is a collection of videos that will teach you everything you need to operate as a bug bounty hunter.
Gain insights from top hackers on AI security vulnerabilities, threats, and best practices to protect AI systems from malicious attacks.
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Discover how bug bounty hunting can boost your cybersecurity career. Expert hackers share insights on skill development, networking, and leveraging experiences for future opportunities.
Explore VNC client vulnerabilities and learn how malicious servers can exploit them. Gain insights from an award-winning hacker on application security and sustainable DevSecOps practices.
Explore XSS sanitizer fuzzing techniques with Tom Anthony, from his hacking past to current cybersecurity insights. Learn about innovative approaches to discovering vulnerabilities in web applications.
Discover advanced techniques for application analysis in bug hunting with insights from a top-ranked researcher. Learn recon strategies and web app vulnerabilities to enhance your ethical hacking skills.
Explore unique vulnerabilities discovered by hacker Roni Carta, inspired by Arsene Lupin. Learn creative exploitation techniques and gain insights into the world of ethical hacking.
Learn insider tips for crafting high-quality bug bounty reports from Roy Davis, an experienced security researcher and manager of Zoom's Bug Bounty program. Gain valuable insights to improve your submissions.
Explore how TikTok's algorithm and user base are leveraged to introduce networking and security concepts to a wider audience through engaging short-form content.
Explore vulnerability research in office applications through fuzzing, code review, and reverse-engineering. Learn to discover and exploit zero-days, with insights on binary exploitation for curious researchers.
Learn to host Capture The Flag competitions, develop secure vulnerable applications, and set up robust infrastructure for large-scale events. Gain insights into challenge creation and security considerations.
Discover API keys hidden in web pages with the open-source TruffleHog Chrome extension. Learn how to use this tool and explore real-world examples of exposed keys in SaaS APIs with open CORS.
Exploring burnout in InfoSec, its impact on mental health, and strategies for better work-life balance. Discusses industry challenges and offers solutions for professionals, especially bug bounty hunters.
Get personalized course recommendations, track subjects and courses with reminders, and more.