Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Cisco ASA internals, reverse engineering techniques, and custom tools for exploit development. Gain insights into vulnerability analysis and mitigation strategies for network security professionals.
Explore techniques for attacking Microsoft Advanced Threat Analytics, including alert suppression, identity exemption, and remote control. Learn about ATA's vulnerabilities and defensive strategies.
Explore HiTag2 RFID encryption vulnerabilities and learn to implement attacks for cloning secure building access tags, based on academic research and practical demonstrations.
Explore motherboard intricacies, security features, and hidden functionalities. Uncover potential exploits, design pitfalls, and challenges in hardware security through chipset analysis and datasheet discoveries.
Explore the cryptanalysis of the Enigma machine, its historical significance, and the techniques used to break its code during World War II.
Critique of penetration testing practices, exploring limitations, misconceptions, and potential harm in cybersecurity. Proposes alternative approaches and challenges industry norms.
Explore USB flash drive forensics, covering hardware, software, file systems, and forensic techniques. Learn about write blockers, Windows registry analysis, and open-source tools for digital investigations.
Explore SAP system vulnerabilities, compression algorithms, and attack techniques. Learn about authentication bypass, validation issues, and practical demonstrations for enhanced security awareness.
Learn essential techniques for IoT hacking, including firmware analysis and finding serial consoles. Gain insights into hardware vulnerabilities and start your journey in this exciting field of information security.
Learn essential threat modeling techniques to identify and mitigate security risks in your systems, enhancing your ability to protect against potential vulnerabilities.
Dive into GLIBC heap exploitation techniques with expert Max Kamper. Learn advanced memory corruption strategies and enhance your cybersecurity skills in this intensive session.
Explore GLIBC heap exploitation techniques with expert Max Kamper. Learn essential concepts, attack vectors, and practical strategies for identifying and exploiting heap vulnerabilities in Linux systems.
Explore advanced techniques for automating user interactions using Sheepl, covering implementation strategies and practical applications for enhanced security testing and simulation.
Explore AWS S3 logging challenges and potential security risks in cloud storage. Learn strategies to navigate complex logging configurations and enhance data protection in AWS environments.
Estrategias para gestionar, desarrollar y retener equipos de investigación en seguridad, abordando desafÃos como la contratación, motivación y alineación con objetivos empresariales.
Get personalized course recommendations, track subjects and courses with reminders, and more.