Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Project Management
Digital Marketing
Python
Managing Conflicts on Projects with Cultural and Emotional Intelligence
Introduction to Engineering Mechanics
Introducción a la gestión de proyectos
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about Cybersecurity by understanding Ethical Hacking, Open Source Intelligence, Web Application Hacking and Buffer overflows in these videos
Learn ethical hacking with Linux, offered by Cyber Mentor. Master Kali Linux, network commands, file system navigation, and bash scripting in a 2-3 hour program.
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake. Network Subnetting Part 2: The Challenge. Building A Basic Network with Cisco Packet Tracer. Subnetted Made Easy. Sub-netting Made easy.
This article includes three parts. The first part of the series is about hunting Breached Passwords. The second part is about finding email addresses. The third part is a look at how to search for resumes on Twitter. The final part is an overview of the…
Web App Testing: Episode 1 - Enumeration, XSS, and UI Bypassing.Web App testing: Episode 3 - XSS and Broken Access Control. Web Apptesting: Ep 5: SQL Injections and Live Bug Bounty Hunting.Bug Bounty - Hunting Third Level Domains.
Pentesting for n00bs: Episode 1 - Legacy (hackthebox).Pentests for n000b's: Episode 2 - Lame (hack thebox), Episode 3 - Blue, Episode 4 - Devel, Episode 5 - Jerry, Episode 6 - Nibbles, Episode 7 - Optimum, Episode 8 - Bashed.
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA. Python 102: Building a Terrible Port Scanner, and a Giveaway. Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec.
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files. Navigating the File System. Controlling Kali Services. Scripting with Bash. Users and Privileges. Installing and Updating Tools. Viewing and editing files.
Learn to navigate 32-bit Windows buffer overflows with ease in under an hour with Cyber Mentor. The program covers spiking, fuzzing, finding offsets, and generating shellcode.
Learn ethical hacking from scratch with Cyber Mentor's 15-hour program. Master Python, Linux, OSINT, scanning tactics, exploitation, and more.
Learn ethical hacking with Cyber Mentor's online program. Master Kali Linux, VMWare, file system navigation, network commands, and bash scripting in 2-3 hours.
Learn hacking essentials with Cyber Mentor in just 1-2 hours. Topics include file transfers, maintaining access, pivoting, cleanup, legal/documentation, and career advice.
Learn hacking techniques like exploiting MS17-010, GPP/cPasswords, and Kerberoasting with Cyber Mentor in a 1-2 hour session. Includes Q&A.
Learn advanced cybersecurity techniques like NTLM Relay, Token Impersonation, and Pass the Hash with Cyber Mentor's 2-3 hour online material.
Learn to build an AD lab, perform LLMNR poisoning, and crack NTLMv2 with Hashcat in this 2-3 hour online program by Cyber Mentor.
Get personalized course recommendations, track subjects and courses with reminders, and more.