Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore car hacking fundamentals, tools, and techniques with expert insights on ECU simulators, CAN messages, and vehicle security, emphasizing practical approaches for beginners.
Discover essential tools for bug bounty hunting: asset discovery, content discovery, and proxy tools. Learn about brute force techniques and Burp Suite for effective vulnerability detection.
Insightful discussion on hacking techniques, security tools, and bug bounty strategies, featuring expert insights on Certificate Transparency and TruffleHog for enhanced cybersecurity practices.
Learn advanced Google search techniques to uncover hidden information and potential security vulnerabilities in websites and online systems.
Comprehensive guide to web application hacking resources, including platforms, tools, and learning materials for aspiring ethical hackers and bug bounty hunters.
Explore asset discovery techniques using Shodan for bug bounty reconnaissance. Learn effective strategies to uncover vulnerabilities and expand your target scope.
Explore techniques for hacking Amazon AWS, focusing on offensive security and red team strategies. Learn about potential vulnerabilities and ethical hacking approaches in cloud environments.
Comprehensive guide on SQL injection techniques, covering various attack vectors and practical examples to enhance offensive security skills and understanding of database vulnerabilities.
Explore common cloud vulnerabilities including SSRF, metadata endpoints, S3 permissions, and federation. Learn to identify and exploit these weaknesses in cloud environments.
Insights on managing bug bounty programs from an ethical hacker's perspective, covering strategies, challenges, and best practices for effective vulnerability disclosure and collaboration.
Learn essential bug bounty reconnaissance techniques, including subfinder, Google dorking, data manipulation, ASN analysis, Shodan basics, and more for effective vulnerability discovery.
Explore web fuzzing techniques for uncovering mysterious bugs with André Baptista. Learn strategies to identify impactful vulnerabilities and enhance your ethical hacking skills.
Explore the security landscape of decentralized finance (DeFi) and learn about potential threats, vulnerabilities, and attack vectors in blockchain-based financial systems.
Explore the critical vulnerability in Ethereum's smart contract, its billion-dollar impact, and the resulting blockchain fork. Gain insights into blockchain security and its far-reaching consequences.
Explore smart contract hacking, CTF challenges, and DEFCON insights with CTS (@gf_256) in this informative discussion on cybersecurity trends and techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.