Social Learning for Open Courses
Learn how to become a better leader by understanding modern product management from one of the best MOOC creators, John Johnson. He has educated over 50k learners worldwide.
In 2021, 10 years after it burst on the scene, the MOOC ecosystem has reached 220M learners and 19.4K courses.
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn CompTIA PenTest+ (Plus) with paid and free online courses from Pluralsight and other top learning platforms around the world. Read reviews to decide if a class is right for you.
So, you want to start a career in penetration testing but don't know where to start? Maybe you've got some great hacking skills, and want to become a security professional? Look no further, this course starts you on your new and exciting path by diving i…
Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization.
Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you're wearing.
As a security professional, you need to test non-technical attack vectors within our engagement. We’ll look at different tools that we can use to bypass locks, motion sensors and even users themselves.
Join one of our cohorts to learn from instructors, experts, or each other with weekly live streams.
A Cohort with the acclaimed Instructor Barbara Oakley with 4+ million learners worldwide. This course weaves late-breaking insights from neuroscience with practical new approaches from the classroom.
Active reconnaissance is a necessary evil. It can sometimes alert defense teams and systems that you're snooping around, but it also helps you to see and document everything about each note on the network. Learn how to active recon the right way.
Many exploits are aimed at server and workstation operating systems. Once you have compromised the network, you will want to zero in on specific hosts and their applications. Understanding how hosts are configured and what they might include within thems…
Part of any PenTest engagement application is an extremely high target. The reason is because of so many moving parts from operating systems all the way to even interfaces that are involved. In this course you will learn to check these components through…
This course (part 9 in the PenTest+ series) focuses on methods of evading security countermeasures, maintaining access and covering your tracks.
Making sure you report everything you've discovered to the client/target is imperative to finish up your engagement. Learn what to include in your report, how to organize, and present your finding in a professional manner.
Your first task in a penetration test project is to define the scope and plan your engagement. This Pentest+ course teaches you how to identify testing requirements, assets in scope, legal boundaries, limitations, rules of engagement, and much more.
Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification.
Get personalized course recommendations, track subjects and courses with reminders, and more.