Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ethical challenges and solutions in handling social engineering pentest aftermath, focusing on responsibility, consequences, and improving security culture.
Demystifies AI and machine learning for SOC teams, focusing on practical applications like data leak prevention. Includes live demo and insights from Credit Agricole's SOC experience.
Automated discovery of RPC functions in Microsoft protocols to find authentication coercion vulnerabilities, with focus on parsing documentation and generating proof-of-concept code.
Exploring the challenges and potential solutions for creating a defendable Internet, examining incentives, economics, and the balance between security and openness in the digital landscape.
Explore strategies for enhancing cyber resilience during geopolitical crises, focusing on threat intelligence and active defense to protect critical information infrastructures.
Explore stack-based buffer overflow exploitation techniques, bypassing modern mitigations by leveraging exception handling mechanisms to resurrect old exploits and achieve successful attacks.
Exploring cybersecurity's evolution, challenges, and future direction. Discusses lessons from the past, current trends, and strategies for shaping the industry's destiny in an increasingly connected world.
Exposing hidden risks in multi-cloud IAM, detailing access flaws, misconfigurations, and inconsistencies that can lead to unintended access and privilege escalation across cloud providers.
Explore unauthenticated remote code execution in popular IAM solutions, covering past attacks, audit approaches, and vulnerability chaining for infiltrating identity providers.
Explore AI-synthesized speech detection techniques and their real-world effectiveness in combating voice cloning and fake audio. Uncover challenges and limitations in current approaches.
Explore Apple's Endpoint Security Framework for macOS threat detection. Learn to utilize ESF data for basic and advanced behavioral-based detections, comparing old and new detection methods.
Explore Microsoft IIS's Dynamic Hashing algorithm and its vulnerabilities. Learn about potential collision attacks on hash tables in web server architecture and their implications for cybersecurity.
Explore WebAssembly security vulnerabilities through a new fuzzing framework, focusing on VM escape and RCE risks in Wasm runtimes for edge computing and web applications.
Uncover vulnerabilities in touchscreen devices through electromagnetic interference attacks, exploring practical methods to compromise security and user interaction on smartphones and tablets.
Explore Kubernetes security vulnerabilities, privilege escalation techniques, and container escape risks. Learn to identify powerful system pods and implement mitigations to protect your cluster from potential attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.