Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ActiveX Controls in Windows, covering auditing, testing, and monitoring techniques for enhanced security and vulnerability assessment.
Explore Google attack techniques, including pentest examples, special characters, and keywords. Learn about honeypots and controlling Google data for enhanced cybersecurity.
Explore cutting-edge cybersecurity defense strategies and the need for rapid response in the face of evolving threats. Learn why traditional processes must adapt to protect against modern attacks.
Enhance corporate network security by creating custom Internet zones for MSIE, tailoring access controls and protection levels for different web resources.
Comprehensive overview of recent legal developments in information security, covering key cases, legislation, and regulatory changes affecting cybersecurity professionals.
Explore cyber-insecurity's impact on the internet's growth with Whitfield Diffie. Gain historical and critical insights into current security challenges, fostering a balanced perspective on digital risks.
Explore how a renowned hacker's expertise shapes government cybersecurity initiatives and fosters collaboration between researchers and officials in this insightful talk by Peiter Zatko.
Exploring privacy implications of combining social media images with face recognition technology for large-scale individual re-identification and sensitive information inference.
Explore a sophisticated attack tool for wireless sensor networks, demonstrating vulnerabilities and potential exploits to enhance security protocols and defensive measures.
Explore the evolving landscape of cybersecurity with former FBI Executive Shawn Henry. Learn strategies to combat advanced threats and shift from traditional defense to proactive offense.
Explore CPU vulnerabilities and their exploitation across multiple operating systems. Learn about the "sysret" instruction flaw, its impact, and mitigation strategies for system security.
Explore advanced heap manipulation techniques in Windows 8, focusing on deterministic heap state prediction, overcoming exploit mitigations, and crafting reliable exploits for kernel pool and user heap vulnerabilities.
Explore the TIME attack, an evolution of CRIME, which exploits HTTP response compression to break SSL encryption and Same Origin Policy. Learn about its simplified attack model and increased attack surface.
Explore the intersection of identity, economics, security, and terrorism in this thought-provoking talk by Adam Shostack, delving into crucial issues shaping our modern world.
Explore techniques for bypassing modern authentication systems, including masquerading attacks and vulnerabilities in security protocols. Learn about potential risks and countermeasures.
Get personalized course recommendations, track subjects and courses with reminders, and more.