Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Information Technology
Software Development
Exploring English: Language and Culture
Marketing Digital: Content & Community Manager
Perdón y reconciliación: cómo sanar heridas
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about Cybersecurity by understanding Ethical Hacking, Open Source Intelligence, Web Application Hacking and Buffer overflows in these videos
Learn ethical hacking with Linux, offered by Cyber Mentor. Master Kali Linux, network commands, file system navigation, and bash scripting in a 2-3 hour program.
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake. Network Subnetting Part 2: The Challenge. Building A Basic Network with Cisco Packet Tracer. Subnetted Made Easy. Sub-netting Made easy.
This article includes three parts. The first part of the series is about hunting Breached Passwords. The second part is about finding email addresses. The third part is a look at how to search for resumes on Twitter. The final part is an overview of the…
Learn pentesting from Cyber Mentor, covering exploitation, shells, credential stuffing, and more in a 2-3 hour material. Includes Q&A on cybersecurity topics.
Learn pentesting from scratch with Cyber Mentor's online material, covering enumeration, scanning with Nessus and Nmap, and Q&A sessions. Duration: 2-3 hours.
Learn pentesting from Cyber Mentor with a focus on scanning tools like Nmap, Nessus, BurpSuite, etc. in a 3-4 hour material.
Learn hacking stages, passive OSINT, and use of tools like Hunter.io, Google Fu, and theharvester in a 3-4 hour material by Cyber Mentor.
Learn to exploit HackTheBox's Fighter in less than an hour with Cyber Mentor. Gain practical skills in Nmap scanning, SQL injection, and privilege elevation.
Learn ethical hacking basics, networking, Linux, coding, and advanced techniques with Cyber Mentor in under an hour.
Learn hacking techniques with Cyber Mentor's online material, covering topics like buffer overflows, fuzzing, generating shellcode, and gaining root. Duration: 1-2 hours.
Master ethical hacking in 12 hours with Cyber Mentor, covering topics from networking basics to advanced hacking techniques and tools.
Learn ethical hacking basics, networking, Linux, coding skills, and more in under an hour with Cyber Mentor's online program.
Learn web application hacking basics with Cyber Mentor in a 5-hour program, covering enumeration, XSS, UI bypassing, SQL injection, and live bug bounty hunting.
- Closing. This course introduces concepts and tools to build a Windows Active Directory Lab, providing resources and instructions to set up and review possible attacks vs the setup.
Get personalized course recommendations, track subjects and courses with reminders, and more.