Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cloud security vulnerabilities, historical incidents, and protective measures. Learn to identify abandoned subdomains and bypass firewalls in this eye-opening talk on hacker perspectives.
Explore why secure coding remains elusive, examining cultural issues, industry challenges, and potential solutions for integrating security into software development practices.
Explore deepfake technology's impact on cybersecurity, covering threats like fraud and fake content, as well as opportunities in biometrics and network traffic analysis.
Learn strategies for being a pioneering security engineer, covering impact, documentation, data storage, education, automation, and corporate security initiatives.
Explore CAN bus fundamentals and hands-on fuzzing techniques for automotive systems, covering ECUs, attack surfaces, and practical demonstrations using various tools and setups.
Explore badge hacking techniques, including card reader software, reading/writing cards, and security encryption, with practical insights and a Python script demonstration.
Explore VoIP phone vulnerabilities, attack methods, and security recommendations. Learn firmware access, emulation approaches, and exploit development for various VoIP devices.
Explore .NET assembly generation, embedding scripting languages, and advanced techniques for creating versatile payloads in this cybersecurity-focused talk on BYOI (Bring Your Own Interpreter).
Explore innovative approaches to enterprise security, focusing on visibility over control, with insights from Heroku's security transformation and practical lessons for implementation.
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Explore the complexities of global cyber norms, challenges in consensus-building, and potential risks in outsourcing digital governance frameworks.
Explore risk management in security, challenging misconceptions and revealing its value. Learn to interpret, measure, and leverage risk effectively for better organizational outcomes.
Explore big data analysis for cybersecurity using Hadoop, tackling malware, network traffic, and log files at scale to overcome processing limitations and enhance threat detection.
Explore innovative approaches to security awareness training, focusing on social engineering techniques to create positive change and effective communication strategies for lasting impact.
Aprenda a evitar erros comuns na resposta a incidentes de segurança cibernética, com foco em preservação de evidências, análise de dados e estratégias eficazes de contenção.
Get personalized course recommendations, track subjects and courses with reminders, and more.