Courses from 1000+ universities
Seven years after replacing a Yale president with a fintech CEO, Coursera picks an Amazon veteran to help fix its slowing growth and falling stock price.
600 Free Google Certifications
Computer Science
Web Development
Software Development
Improving Healthcare Through Clinical Research
Functional Programming Principles in Scala
Product Management Essentials
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn comprehensive malware analysis techniques, from environment setup to static analysis, PE header examination, and creating YARA rules. Gain practical skills through real-world examples like Stuxnet.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Explore ChatGPT's applications in cybersecurity, from pentesting and shell generation to blue team strategies. Learn to leverage AI for enhanced security practices and automation.
Aprende a instalar y configurar BlackArch Linux para pruebas de penetración, incluyendo entornos de escritorio, resolución de pantalla y herramientas de VMware.
Learn Metasploit basics for penetration testing: explore modules, exploits, and payloads to enhance your cybersecurity skills and understand vulnerabilities.
Explore DNS enumeration, automated information gathering with Maltego, and leveraging Shodan for accessing routers, servers, and webcams in this comprehensive OSINT tutorial.
Explore Wazuh SIEM for detecting and defending against cyber threats. Learn to collect, analyze, and respond to security events for effective blue team operations.
Learn to use custom and community Snort rules for effective intrusion detection. Discover how to capture network traffic, identify malicious activity, and set up logging and notifications for enhanced security.
Learn to perform host discovery and vulnerability scanning using Nessus, a powerful proprietary tool. Gain practical skills in identifying network vulnerabilities and enhancing cybersecurity defenses.
Comprehensive tutorial series on web app penetration testing, covering tools, techniques, and real-world scenarios for identifying and exploiting vulnerabilities in web applications.
Learn web app penetration testing techniques using Burp Suite, including setup, brute force attacks, and CSRF vulnerability assessment.
Master Linux essentials for ethical hacking: file management, permissions, networking, security tools, and hands-on challenges to enhance your skills and protect systems effectively.
Learn to develop TCP servers, clients, and scanners using Python3 for penetration testing. Gain practical skills in network security and ethical hacking.
Learn to build a custom penetration testing distribution using open-source frameworks like PenTesters Framework and BlackArch repos. Covers tool installation on various Linux distributions.
Get personalized course recommendations, track subjects and courses with reminders, and more.