50,000+ Free Udemy Courses to Start Today
View CoursesLeverage AI to supercharge your web dev skills and streamline your workflow, allowing you to code, learn, and job search faster than you ever have before!
3 h 9 m
This tutorial teaches you Bulma CSS through 13 interactive screencasts. In less than an hour you'll have built three websites with the popular CSS framework.
1 h 8 m
This tutorial teaches you CSS variables through eight interactive screencasts. It's value-packed from beginning to end, and is probably the fastest way to get an in-depth understanding of CSS Variables.
31 m
Gain SAP MM skills with free online training from Prompt Edify. Dive into the S4 HANA insights. Increase your talents in South Africa with our exciting courses.
Here are the top three things that this course suggests to practice self-care and enhance your life. Learn the fundamentals of Ayurveda and see how it benefits of your life.
This course covers the fundamental elements of GD&T, symbols, and their meaning. Precision measurement devices are briefly discussed.
2 h
Learn how to use Canva and explore our many features and tools. If you're new to Canva, this is an excellent place to start.
1 h
An introduction to Python programming, a popular language for general-purpose programming, data research, web development, and other applications.
80 h
Motivate people to address difficult issues and develop the ability to thrive in the face of change's risks.
12 h
Active Directory (AD) is widely utilized by businesses from all industries, non-profits, government agencies, and educational institutions of all kinds. AD, by definition, is easily misconfigured and contains numerous fundamental weaknesses and well-known vulnerabilities.
To succeed in information security, we must have a deep understanding of the Windows and Linux operating systems and be comfortable navigating the command li...
Binary exploitation is a fundamental aspect of penetration testing, but learning it can be challenging. This is primarily due to the complexity of binary files and their underlying machine code, as well as their interactions with computer memory and the CPU.
After finishing this job role route, you will have the practical abilities and mentality required to undertake professional security assessments against enterprise-level infrastructure at an intermediate level.
This course covers the fundamental concepts of local privilege escalation required for success against Windows and Linux systems. The path includes manual enumeration and exploitation, as well as the use of tools to facilitate the process.
The Bug Bounty Hunter Job Role Path is for people who wish to get started in Bug Bounty Hunting but have little to no experience.