Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn comprehensive malware analysis techniques, from environment setup to static analysis, PE header examination, and creating YARA rules. Gain practical skills through real-world examples like Stuxnet.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Aprende a instalar y configurar BlackArch Linux para pruebas de penetración, incluyendo entornos de escritorio, resolución de pantalla y herramientas de VMware.
Explore ChatGPT's applications in cybersecurity, from pentesting and shell generation to blue team strategies. Learn to leverage AI for enhanced security practices and automation.
Learn Metasploit basics for penetration testing: explore modules, exploits, and payloads to enhance your cybersecurity skills and understand vulnerabilities.
Explore DNS enumeration, automated information gathering with Maltego, and leveraging Shodan for accessing routers, servers, and webcams in this comprehensive OSINT tutorial.
Explore Wazuh SIEM for detecting and defending against cyber threats. Learn to collect, analyze, and respond to security events for effective blue team operations.
Learn to use custom and community Snort rules for effective intrusion detection. Discover how to capture network traffic, identify malicious activity, and set up logging and notifications for enhanced security.
Learn to perform host discovery and vulnerability scanning using Nessus, a powerful proprietary tool. Gain practical skills in identifying network vulnerabilities and enhancing cybersecurity defenses.
Comprehensive overview of MITRE ATT&CK framework for cybersecurity professionals, covering its application in red team and blue team operations with practical insights and resources.
Comprehensive tutorial series on web app penetration testing, covering tools, techniques, and real-world scenarios for identifying and exploiting vulnerabilities in web applications.
Learn to build a custom penetration testing distribution using open-source frameworks like PenTesters Framework and BlackArch repos. Covers tool installation on various Linux distributions.
Learn to secure Docker daemon with TLS encryption and user namespaces. Covers Docker communication, implementation of user namespaces, and includes a practical demonstration for hands-on learning.
Learn to secure Docker host OS and set up audit rules for Docker artifacts. Covers best hosting OS, Linux audit framework, auditing tools, and includes practical demonstration.
Get personalized course recommendations, track subjects and courses with reminders, and more.