Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore data analytics and visualization tools for red team operations, enhancing pentesting capabilities through advanced consolidation and analysis techniques.
Comprehensive exploration of vulnerabilities in radiation monitoring devices through reverse engineering, RF analysis, and hardware hacking, revealing critical security flaws in nuclear industry equipment.
Uncover remote exploits in SQLite's memory corruption vulnerabilities, revealing potential attack surfaces across various applications using this widely-embedded database software.
Updating attack and defense strategies for cloud-based systems, focusing on interdependence and pivoting techniques. Covers DDoS, footprinting, exploitation, persistence, and more in AWS environments.
Explore malware analysis techniques using a custom C&C server for OSX/FruitFly. Learn to decode, monitor, and understand malware behavior for enhanced cybersecurity skills.
Explore advanced SS7 attacks and defenses using open-source firewall. Learn to trick attackers, reduce vulnerabilities, and enhance mobile network security against intelligence agencies.
Innovative method for hardware hacking using connection matrix, enabling arbitrary analog-alike connections and versatile bus interfacing for comprehensive hardware exploitation.
Explore counter-forensic techniques to safeguard image-based intelligence from exploitation attacks, addressing current and emerging threats in visual asset protection.
Learn techniques for bypassing electronic door locks, exploring vulnerabilities and hacking methods used in popular media depictions of cybersecurity.
Explore email vulnerabilities and domain name collisions as potential security threats, focusing on protecting email accounts from advanced persistent threats and exploitation techniques.
Explore the mobile-telephony cybercrime ecosystem in Asia through a 7-month honeypot study, revealing SMS scams, fraudulent calls, and VoIP phishing attempts. Gain insights into real threats facing mobile users.
Explore model-based testing techniques to detect logical bugs in SSL/TLS and Wi-Fi implementations, enhancing network protocol security and implementation.
Explore how machine learning can combat Business Email Compromise scams, a sophisticated threat that has cost organizations billions in losses through fraudulent wire transfers.
Explore a new paradigm for integrating development teams with offensive and defensive teams to enhance software security throughout the development lifecycle, fostering knowledge sharing and strengthening defenses.
Explore hypervisor-based kernel protection, its limitations, and the need for higher-privilege solutions like Shadow-Box to combat rootkits and kernel exploits effectively.
Get personalized course recommendations, track subjects and courses with reminders, and more.