Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore digital forensics and incident response using Velociraptor. Learn about VFS, artifacts, automation, process tracking, and hunting for compromised machines with practical demonstrations and expert insights.
Explore API security essentials, learn testing importance, and gain insights from industry experts. Discover practical tips for securing APIs and starting your journey in API hacking.
Explore hands-on ransomware analysis with demos of RAASNet, Yashma, and Lockbit. Learn configuration, building, and detonation techniques from a malware analyst's perspective.
Master the art of gathering and analyzing open-source intelligence through practical techniques and methodologies for effective information collection and investigation.
Discover how to use Nuclei for uncovering exposed .git repositories and extracting sensitive information from web applications in this cybersecurity demonstration.
Comprehensive exploration of the Log4j vulnerability, including demonstrations of exploits in Minecraft, industry responses, and defensive strategies.
Comprehensive review of Offensive Security Exploit Developer certification, covering course content, exam preparation, and practical tips. Includes Q&A addressing common concerns for aspiring exploit developers.
Learn to use Snyk for finding and fixing vulnerabilities in web applications, including hands-on practice with a vulnerable app and a CTF challenge involving prototype pollution and RCE.
Comprehensive review of OSEP certification, covering exam preparation, note-taking strategies, report writing, and comparison with OSCP. Offers insights on course usefulness, timeline, and target audience.
Learn to classify malware using YARA rules, from setup to integration. Explore writing techniques, resources, and practical applications for effective malware analysis and detection.
Learn to pivot through networks using Chisel, covering setup, reconnaissance, static binaries, reverse connections, SOCKS proxies, and forward shells for effective network penetration.
Explore Java deserialization vulnerabilities and create custom exploits for remote code execution in this hands-on tutorial, featuring practical examples and step-by-step guidance.
Learn filter evasion techniques for reverse shells, including code obfuscation and bypassing security measures, to enhance your penetration testing skills.
Explore a new framework for assessing smart contract vulnerabilities, learn to calculate risk and impact, and discover how to prioritize security weaknesses in blockchain systems.
Explore the deceptive tactics of malware disguised as CAPTCHA, uncovering its distribution methods and analyzing its impact on cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.