Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Artificial Intelligence
Project Management
Python
Mechanical Ventilation for COVID-19
Matrix Algebra for Engineers
Introduction to Programming with MATLAB
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Security online courses. Find the best Security training programs and enhance your skills today!
Explore hacker motivations and experiences in bug bounty programs through insights from top hackers and industry experts. Learn about challenges, rewards, and the evolving security landscape.
Experts discuss hacking US government systems, vulnerability disclosure programs, and cybersecurity challenges in federal agencies. Insights on bug bounties, tech surges, and public-facing systems.
Explore hacking insights from Samy Kamkar, renowned for the MySpace worm, as he shares his expertise and experiences in cybersecurity at the Security@ Conference.
Experts discuss cybersecurity challenges and strategies in financial services, exploring innovative approaches to protect digital assets and customer data in an evolving threat landscape.
Explore HackerOne's platform from both security team and researcher perspectives, covering report management, rewards, and key features for effective vulnerability disclosure.
Insights from experienced hackers on effective strategies, tools, and etiquette for successful bug bounty hunting and building positive relationships with security teams.
Explore GitLab's secure code shipping practices, tools, and industry best practices. Learn how they leverage HackerOne's community for swift security issue detection and prioritization.
Explore hacker-powered security in agile software development, covering open source risks, bug bounty benefits, and integrating security into continuous delivery workflows.
Panel discussion on engineering, hacking, and security careers featuring insights from industry professionals. Covers career paths, learning resources, challenges, and advice for aspiring hackers and engineers.
Explore how external hackers can enhance security, assess the suitability of bug bounty programs, and learn to build effective vulnerability disclosure programs for improved software development.
Learn to exploit vulnerabilities in ChatGPT-generated code, including SQL injection and cross-site scripting. Practical demonstrations enhance cybersecurity skills for ethical hacking and penetration testing.
Learn to understand, test, and crack JSON Web Tokens (JWTs) for enhanced web application security. Explore JWT structure, vulnerabilities, and best practices for implementation and protection.
Explore remote code execution vulnerabilities in physical security systems, learning to exploit and disarm alarms through reverse engineering and network protocol analysis.
Unveiling a stealthy data exfiltration method that bypasses TLS inspection security solutions. Learn about SNIcat and how it circumvents perimeter defenses, with insights on mitigation and detection strategies.
Explore how new security measures in Chrome can be exploited to bypass the sandbox and compromise user privacy, revealing potential vulnerabilities in browser protection mechanisms.
Get personalized course recommendations, track subjects and courses with reminders, and more.