Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore x86 architecture for security research: privileges, events, hypervisors, and emerging tech. Gain foundational knowledge to streamline your research setup and focus on key questions.
Explore advanced incident remediation techniques for large network breaches, including mass remediation and outrunning the attacker. Learn from real-world experiences to effectively handle complex security incidents.
Explore security implications of HDMI protocols like CEC and HEC, including potential vulnerabilities and corporate risks. Includes demonstration of CEC security testing tool.
Explore 4G/LTE network security, potential vulnerabilities, and testing methods. Learn about LTE deployments, attack vectors, and strategies for securing these networks.
Explore reverse engineering of .NET smart card operating systems, focusing on code analysis and communication protocols to uncover vulnerabilities and test security measures.
Explore the potential of Twitter data to reveal psychopathic traits in killers. Delve into psychological research, profiling techniques, and the intersection of social media and criminal behavior analysis.
Maximizing home-field advantage in cybersecurity through proactive defense, intelligence gathering, and attacker modeling. Learn to adapt strategies, set traps, and take initiative for effective protection.
Explore vulnerabilities in mobile point-of-sale systems, including MitM attacks, arbitrary code injection, and firmware exploitation. Learn to identify weaknesses and conduct security assessments in payment technologies.
Explore network exploitation using Scratch programming language, extending its capabilities to create exploits and fuzz vulnerable services through custom TCP/IP function blocks.
Explore SmartNIC-based data center security, featuring improved isolation, offload capabilities, and policy scaling. Learn about innovative host introspection techniques for enhanced threat detection and workload integrity.
Explore hacking techniques for machine learning systems in speech, text, and facial recognition, including exploits, backdoors, and adversarial attacks. Live demo included.
Explore ephemeral vulnerabilities in bug bounties, their impact, and how to identify and exploit them. Learn from real-world examples and strategies for continuous security assessment.
Comprehensive workshop on ARM assembly and shellcode creation, covering basics, execve() shell, and reverse shell. Includes hands-on practice with QEMU emulator and Raspberry Pi hardware.
Explore Java's Remote Method Invocation security vulnerabilities, enumeration techniques, and exploitation tools with BaRMIe. Learn about common mistakes and potential solutions in RMI implementations.
Explore Subgraph OS: a hardened Linux desktop with advanced security features, including kernel protection, application sandboxing, and network safeguards.
Get personalized course recommendations, track subjects and courses with reminders, and more.