Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore legal aspects of cybersecurity contracts, including risk allocation and service agreement formation, to effectively protect client data and navigate professional responsibilities.
Explore FTC regulations on deceptive advertising in security product marketing. Learn to avoid violations and create compliant, ethical promotional strategies.
Explore firmware vulnerabilities in UEFI, Mac EFI, and Coreboot, and learn about potential stealth implants that can bypass modern OS defenses.
Learn about the takedown of Avalanche, a secure server infrastructure used for cybercrime. Explore the investigation, challenges, and international cooperation in dismantling this network that caused massive financial losses.
Unveiling vulnerabilities in 3G/4G networks, introducing novel attack vectors for user tracking and monitoring, and discussing potential privacy implications for mobile users worldwide.
Explore the potential physical safety risks of IoT devices being repurposed for malicious attacks, going beyond known cybersecurity threats to examine real-world dangers.
Explore user studies for security software, focusing on simulated attack scenarios to assess tool effectiveness and user behavior during threats.
Comprehensive recommendations for building secure penetration testing operations, including technical aspects, policies, procedures, and client communication strategies.
Explore design flaws in popular attack tools and techniques, and learn strategies for active intrusion prevention in this cybersecurity presentation from Black Hat.
Discover differential fuzzing for efficient cryptographic software testing, focusing on logic bugs rather than memory corruption. Learn principles, tools, and real-world applications.
Explore a novel approach to control networks through WSUS servers, bypassing limitations and potentially attacking air-gapped systems. Learn techniques, limitations, and protective measures.
Análisis de currÃculos de seguridad y acreditaciones frente a las necesidades de la industria, examinando su desarrollo, fuerzas que los moldean y soluciones propuestas para acreditar programas.
Unveils a novel, undetectable DMA attack exploiting DDR4 hardware vulnerabilities, enabling arbitrary memory access in live systems using a custom FPGA probe during sleep state.
Learn practical approaches to scale application security, implement effective tools, and build a successful program for securing numerous products simultaneously.
Explore FlowFuzz, a fuzzing framework for SDN switches using OpenFlow protocol. Learn about testing and securing software-defined networking infrastructure.
Get personalized course recommendations, track subjects and courses with reminders, and more.