Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced malware obfuscation techniques that bind execution to specific host environments, making automated analysis ineffective. Learn about the arms race between malware authors and security practitioners.
Explore legal considerations in computer network defense, including legal frameworks, liability issues, and best practices for cybersecurity professionals.
Insightful CISO panel discussion exploring top security challenges, industry trends, and emerging threats in cybersecurity landscape. Covers certifications, zero-day research, and open source risks.
Explore Android's dex file format, analyze vulnerabilities in dex analysis tools, and learn techniques to detect post-compilation modifications and protect against potential exploits.
Explores protocol-level evasion techniques for bypassing web application firewalls, focusing on vulnerabilities in virtual patches and demonstrating real-world examples and countermeasures.
Explore EFI-based rootkits on Intel Macs, covering architecture, kernel injection techniques, persistence methods, and potential defenses against these sophisticated threats.
Explore the future of personal data with industry experts discussing privacy, security, and technological advancements in information management.
Automated system for detecting embedded code vulnerabilities in software packages. Uses machine learning to identify package clones, improving security tracking for Linux vendors like Debian and Red Hat.
Explore iSCSI security vulnerabilities and potential attack vectors in storage area networks, with insights from expert Himanshu Dwivedi.
Explore national security, industrial and corporate information security, and the role of security providers in this comprehensive discussion by industry experts.
Explore signature domination, propagation graphs, and automatic classification in this advanced cybersecurity analysis session, featuring innovative techniques for code comparison and navigation.
Learn rapid threat modeling techniques to identify and mitigate security risks in software systems. Enhance your ability to protect against potential vulnerabilities and attacks.
Explore scalable search techniques in dark peer-to-peer networks, focusing on navigable small world networks and practical applications for secure, decentralized communication.
Explore techniques for enhancing Windows security against shatter attacks, focusing on vulnerabilities in message-passing mechanisms and potential safeguards for system integrity.
Explore the Defense Cyber Crime Center's role in digital forensics, cybercrime investigation, and national security through expert insights and real-world case studies.
Get personalized course recommendations, track subjects and courses with reminders, and more.