Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Management & Leadership
Artificial Intelligence
Digital Marketing
Model Thinking
How Things Work: An Introduction to Physics
Mathematical and Computational Methods
Organize and share your learning with Class Central Lists.
View our Lists Showcase
This path teaches the core concepts of local privilege escalation necessary for being successful against Windows and Linux systems. The path covers manual enumeration and exploitation and the use of tools to aid in the process.
Comprehensive training for aspiring penetration testers, covering essential concepts, tools, and methodologies for professional security assessments against enterprise-level infrastructure.
Comprehensive introduction to binary exploitation, covering assembly language, buffer overflows on Linux and Windows, and Python scripting for crafting exploits and automating tasks.
Comprehensive guide to mastering Linux and Windows operating systems, focusing on command-line proficiency, system management, and security best practices for information security professionals.
Comprehensive guide to Active Directory enumeration techniques, covering LDAP, PowerView, and BloodHound tools for identifying vulnerabilities and attack vectors in AD environments.
The Bug Bounty Hunter Job Role Path is for individuals who want to enter the world of Bug Bounty Hunting with little to no prior experience.
Get personalized course recommendations, track subjects and courses with reminders, and more.