Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn comprehensive malware analysis techniques, from environment setup to static analysis, PE header examination, and creating YARA rules. Gain practical skills through real-world examples like Stuxnet.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Aprende a instalar y configurar BlackArch Linux para pruebas de penetración, incluyendo entornos de escritorio, resolución de pantalla y herramientas de VMware.
Explore ChatGPT's applications in cybersecurity, from pentesting and shell generation to blue team strategies. Learn to leverage AI for enhanced security practices and automation.
Learn Metasploit basics for penetration testing: explore modules, exploits, and payloads to enhance your cybersecurity skills and understand vulnerabilities.
Explore DNS enumeration, automated information gathering with Maltego, and leveraging Shodan for accessing routers, servers, and webcams in this comprehensive OSINT tutorial.
Comprehensive guide on personal security and OPSEC, covering tools, techniques, and best practices to enhance digital safety and protect against cyber threats.
Explore Wazuh SIEM for detecting and defending against cyber threats. Learn to collect, analyze, and respond to security events for effective blue team operations.
Learn to use custom and community Snort rules for effective intrusion detection. Discover how to capture network traffic, identify malicious activity, and set up logging and notifications for enhanced security.
Learn to perform host discovery and vulnerability scanning using Nessus, a powerful proprietary tool. Gain practical skills in identifying network vulnerabilities and enhancing cybersecurity defenses.
Comprehensive overview of MITRE ATT&CK framework for cybersecurity professionals, covering its application in red team and blue team operations with practical insights and resources.
Comprehensive tutorial series on web app penetration testing, covering tools, techniques, and real-world scenarios for identifying and exploiting vulnerabilities in web applications.
Learn web app penetration testing techniques using Burp Suite, including setup, brute force attacks, and CSRF vulnerability assessment.
Master Linux essentials for ethical hacking: file management, permissions, networking, security tools, and hands-on challenges to enhance your skills and protect systems effectively.
Get personalized course recommendations, track subjects and courses with reminders, and more.