Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Amazon Cognito security misconfigurations, including unauthorized access, authentication bypass, and privilege escalation. Learn detection techniques and developer recommendations.
Explore ClipboardEvent listeners as potential XSS vectors in web applications. Learn techniques for identifying and exploiting vulnerabilities to enhance your offensive security skills.
Explore RFC vulnerabilities and their impact on web security with Inti De Ceukelaire. Learn to identify and exploit logic flaws in protocols for more effective bug hunting and penetration testing.
Mastering command-line tools for efficient data manipulation in offensive security. Learn sorting, regex, grep, find, and JSON processing to enhance your hacking capabilities.
Discover how Frans Rosen achieved remote code execution on Apple through hot jar swapping. Learn about the research, exploit, and analysis behind this impressive security finding.
Explore techniques for reversing Web Assembly (wasm) in this offensive security talk. Learn key strategies and tools for analyzing and understanding wasm code.
Explore smart contract vulnerabilities, including re-entrancy attacks, delegatecall risks, and price oracle issues. Learn from real-world examples and gain insights into securing blockchain applications.
Discover effective blackbox monitoring techniques for timely bug detection in web applications. Learn task-based hybrid approaches, freshness indicators, and risk markers for improved security.
Dive into a critical smart contract vulnerability analysis, exploring a $600,000+ bug in Port Finance and learning how it was identified through a bug bounty program before potential exploitation.
Explore smart contract auditing through a real-world example, gaining insights into security practices and vulnerability detection in blockchain technology.
Insightful interview with @seclilc on her cybersecurity journey, covering hacking, reconnaissance, tools, work-life balance, and overcoming challenges in the field.
Discover how to find XSS vulnerabilities on high-profile websites and create effective proof-of-concept exploits to demonstrate potential data leakage risks.
Explore techniques for exploiting vulnerabilities in Continuous Integration systems, focusing on security risks and potential attack vectors in the software development pipeline.
Explore cloud wallet vulnerabilities and crypto web app hacking techniques in this talk by @samwcyo, covering blind XSS, SQL injection, and account takeovers in the cryptocurrency ecosystem.
Discover effective techniques for identifying vulnerabilities through source code debugging. Learn to enhance your bug hunting skills and improve your ability to find security flaws in software.
Get personalized course recommendations, track subjects and courses with reminders, and more.