Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive guide on setting up and configuring UFW (Uncomplicated Firewall) for Linux server security, covering installation, rule management, and best practices.
Learn to leverage Docker for pentesting and bug bounty hunting. Set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit containers. Explore advantages and practical applications of containerization in cybersecurity.
Informative discussion on CEH vs CISSP certifications, cybersecurity degrees, and differences between CTFs and penetration tests, offering insights for aspiring infosec professionals.
Explore secure coding, HackTheBox, and web app penetration testing in this informative cybersecurity discussion featuring expert insights and practical tips for developers and security enthusiasts.
Installation and review of CrunchBangPlusPlus, a community-driven Debian-based Linux distro focused on simplicity and performance, using Openbox window manager without a desktop environment.
Comprehensive walkthrough for pwning Curling on HackTheBox, covering scanning, exploiting Joomla vulnerabilities, and gaining system access.
Learn DNS enumeration techniques using Dig, Nslookup, and Host tools for effective reconnaissance and troubleshooting in network security and administration.
Explore Ghidra's features for malware analysis through a hands-on examination of Stuxnet, demonstrating reverse engineering techniques and tool capabilities.
Develop an Nmap scanner using Python3 for network reconnaissance and vulnerability assessment. Learn to automate scanning tasks and interpret results for enhanced cybersecurity skills.
Demonstration of KRACK Attack Proof of Concept on Android/Linux devices, including installation, configuration, and testing steps for this Wi-Fi security vulnerability.
Explore QuasarRAT, a powerful Windows remote administration tool with features like file management, remote desktop, and keylogging. Learn its capabilities and potential applications.
Explore Shodan's capabilities to find internet-connected devices, from webcams to routers. Learn search techniques, filters, and CLI installation for enhanced cybersecurity awareness.
Explore Linux persistence techniques using SSH keys, web shells, and cron jobs. Learn to maintain system access across restarts and credential changes for effective red team operations.
Explore techniques for elevating privileges on Linux systems using kernel exploits and misconfigured SUDO permissions. Learn essential skills for red team operations and penetration testing.
Comprehensive guide to password security, covering LastPass breach, secure password generation, storage, and management. Includes practical tips and tools for protecting personal information.
Get personalized course recommendations, track subjects and courses with reminders, and more.