Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore recon fundamentals through practical examples in this offensive security talk. Learn essential techniques for effective reconnaissance in bug bounty and penetration testing.
Explore techniques for finding 0-day vulnerabilities in enterprise web applications, focusing on HCL Digital Experience, Solarwinds Web Help Desk, and Sitecore's Experience Platform.
Explore cloud hacking techniques without malware, covering state actors, exploitation methods, and initial foothold strategies for offensive security professionals.
Comprehensive guide to application analysis for bug hunters, covering advanced techniques, tools, and methodologies to identify vulnerabilities and maximize bounty rewards.
Cybersecurity expert Alissa Knight discusses API and car hacking, content creation for hackers, and shares insights on the evolving landscape of digital security threats and strategies.
Insightful discussion on hacking, content creation, and API security with TheXSSRat. Covers career paths, learning strategies, and practical tips for aspiring cybersecurity professionals.
Insights from a top bug bounty hunter on hacking methodology, government cybersecurity, and career advice for aspiring ethical hackers.
Comprehensive walkthrough on using WPScan for WordPress security assessment, featuring insights from the tool's creator ethicalhack3r during a Live Recon episode.
zseano demonstrates vulnerability testing methodologies on Rockstar Games, showcasing tools like Burp Suite and techniques for identifying XSS and open redirects in this live recon session.
Explore codingo_'s unique recon methodology for ethical hacking, featuring tools like SecurityTrails, FDNS, and Whoxy to enhance your cybersecurity skills and bug bounty hunting techniques.
Explore live recon and distributed recon automation using Axiom with @pry0cc. Learn advanced techniques for efficient and effective bug bounty hunting and cybersecurity research.
Explore live recon and automation techniques for Shopify's bug bounty program with expert insights, enhancing your skills in identifying vulnerabilities and maximizing bounty rewards.
Panel discussion on leveraging bug bounties for career growth, knowledge expansion, and community building in infosec. Experts share insights on how bug bounties have impacted their professional journeys.
Insights into successful bug bounty hunting strategies and experiences over a 12-month period, focusing on mindset, persistence, and effective techniques for finding vulnerabilities.
Practical guide to overcoming initial challenges in bug bounty hunting, covering automation, reconnaissance, common vulnerabilities, and essential hacking skills for beginners.
Get personalized course recommendations, track subjects and courses with reminders, and more.