Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover common recon mistakes in bug bounty hunting and learn effective strategies to improve your reconnaissance techniques for successful vulnerability discovery.
Comprehensive guide to API hacking techniques, covering browsing, JavaScript analysis, authentication, content discovery, and HTTP methods for effective vulnerability detection.
Learn effective target selection and reconnaissance techniques for bug bounty hunting in this comprehensive 5-week program.
Learn about Cross-Site Request Forgery (CSRF) attacks, their impact on web security, and effective prevention techniques to protect your applications from this common vulnerability.
Comprehensive explanation of Insecure Direct Object Reference (IDOR) vulnerabilities, their impact on web security, and techniques for identifying and exploiting them in bug bounty programs.
Learn to create custom wordlists using AI for effective bug bounty hunting. Enhance your cybersecurity skills with this innovative approach to ethical hacking and web application testing.
Discover how a bug bounty hunter successfully hacked a major online casino. Learn about the techniques used and gain insights into the world of ethical hacking and cybersecurity.
Explore techniques for hacking Amazon AWS, focusing on offensive security and red team strategies. Learn about potential vulnerabilities and ethical hacking approaches in cloud environments.
Comprehensive guide on SQL injection techniques, covering various attack vectors and practical examples to enhance offensive security skills and understanding of database vulnerabilities.
Insights on managing bug bounty programs from an ethical hacker's perspective, covering strategies, challenges, and best practices for effective vulnerability disclosure and collaboration.
Learn essential bug bounty reconnaissance techniques, including subfinder, Google dorking, data manipulation, ASN analysis, Shodan basics, and more for effective vulnerability discovery.
Explore web fuzzing techniques for uncovering mysterious bugs with André Baptista. Learn strategies to identify impactful vulnerabilities and enhance your ethical hacking skills.
Explore the security landscape of decentralized finance (DeFi) and learn about potential threats, vulnerabilities, and attack vectors in blockchain-based financial systems.
Explore the critical vulnerability in Ethereum's smart contract, its billion-dollar impact, and the resulting blockchain fork. Gain insights into blockchain security and its far-reaching consequences.
Explore adversarial approaches to smart contracts with insights on potential vulnerabilities and attack vectors, enhancing your understanding of blockchain security.
Get personalized course recommendations, track subjects and courses with reminders, and more.