Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Marketing
Programming Languages
Discover Dentistry
Exploring Play: The Importance of Play in Everyday Life
Mathematical Economics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
HackerSploit's online program offers a comprehensive guide to malware analysis, from setting up a sandbox environment to creating YARA rules. Duration: 3-4 hours.
Learn to use ChatGPT for cybersecurity with HackerSploit's concise guide, covering pentesting, generating shells, fuzzing, and more in under an hour.
HackerSploit offers a 1-2 hour training on BlackArch Linux installation, configuration for penetration testing, and VMware tools usage.
Learn Metasploit basics from HackerSploit in under an hour. Ideal for beginners, this program covers security vulnerabilities, penetration testing, and IDS signature development.
DNS Enumeration Tutorial - Dig, Nslookup & Host.Maltego - Automated Information Gathering.Information Gathering With Shodan.Shodan Search Engine Tutorial - Access Routers,Servers,Webcams + Install CLI.
Learn to perform host discovery and vulnerability scanning with Nessus in less than an hour with HackerSploit.
Learn to identify network intrusions using Snort rules in under an hour with HackerSploit. Gain skills in capturing traffic and detecting malicious activity.
Learn web app penetration testing with HackerSploit's 12-hour program. Master tools like Burp Suite, ZAP, and OWASP Juice Shop, and explore topics from brute force to XSS and SQL injection.
Learn to set up your own penetration testing distribution using open-source frameworks with HackerSploit. Less than 1-hour material.
HackerSploit offers a concise guide on securing Docker daemon with TLS encryption and user namespaces, including a practical demonstration. Less than 1-hour workload.
Learn to secure Docker host OS and set up audit rules with HackerSploit's concise guide, including practical demonstrations. Less than 1-hour workload.
Learn to audit Docker platform security with HackerSploit's concise guide, featuring practical demonstrations and insights into Docker architecture. Less than 1-hour workload.
Learn to optimize Nmap scans for different network environments in under an hour with HackerSploit. Understand timing templates, parallelism, host group sizes, and more.
Get personalized course recommendations, track subjects and courses with reminders, and more.