Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn the basics of cloud hacking in less than an hour with NahamSec, including offensive security, red team tactics, and bug bounty hunting.
Learn bug bounty hunting with NahamSec in under an hour, covering topics like platforms, programs, scope, program age, and personal preferences.
Learn bug bounty essentials with NahamSec in under an hour. Topics include asset discovery, content discovery, proxy tools, brute force, and Burp Suite.
Learn from NahamSec about the next steps after recon in bug bounty hunting, in less than an hour.
Learn the art of directory brute forcing in less than an hour with NahamSec. The training includes hands-on examples and insights into effective approaches.
Join NahamSec's virtual offensive security event, hosted by Farah Hawa & InsidePhD, for less than an hour of material on attacking wide scopes. Learn from industry expert, Hussein Daher.
Learn how to protect websites from hackers with NahamSec's concise guide, covering topics like DNS takeovers and creating proof of concepts. Less than 1-hour workload.
Learn hacking techniques with NahamSec's concise tutorial on API hacking in partnership with Snyk, all in under an hour.
Learn to identify all domains registered by a company with NahamSec's concise guide, requiring less than an hour of your time.
Learn to launch your first smart contract, coin, and NFT with NahamSec in under an hour. Understand Solidity, ERC-20 token creation, and blockchain security.
Learn the basics of smart contracts, their functioning, and the necessary tools with NahamSec in under an hour. Includes a quick demo and programming language guidance.
Learn about attack surface management and certificate transparency in under 10 minutes with NahamSec's concise material.
Learn from Farah Hawaa's experience in triaging bug bounty reports in this less than 1-hour material by NahamSec.
Learn to identify leaked API keys with NahamSec's concise guide, using manual methods or tools like TruffleHog. Less than 1-hour workload.
Learn to identify and exploit Grafana's Unauthenticated Directory Traversal in under an hour with NahamSec's concise training.
Get personalized course recommendations, track subjects and courses with reminders, and more.