Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
This path teaches the core concepts of local privilege escalation necessary for being successful against Windows and Linux systems. The path covers manual enumeration and exploitation and the use of tools to aid in the process.
Comprehensive training for aspiring penetration testers, covering essential concepts, tools, and methodologies for professional security assessments against enterprise-level infrastructure.
Comprehensive introduction to binary exploitation, covering assembly language, buffer overflows on Linux and Windows, and Python scripting for crafting exploits and automating tasks.
Comprehensive guide to mastering Linux and Windows operating systems, focusing on command-line proficiency, system management, and security best practices for information security professionals.
Comprehensive guide to Active Directory enumeration techniques, covering LDAP, PowerView, and BloodHound tools for identifying vulnerabilities and attack vectors in AD environments.
The Bug Bounty Hunter Job Role Path is for individuals who want to enter the world of Bug Bounty Hunting with little to no prior experience.
Get personalized course recommendations, track subjects and courses with reminders, and more.