Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore forging trusts in Active Directory for deception-based defense. Learn techniques to implant decoy objects, trap adversaries, and enhance network security through live demonstrations.
Explore cloud security vulnerabilities, attack tactics, and proactive measures for Azure and AWS. Learn about hunting compromised systems and securing cloud marketplaces.
Insights on creating resilient, high-fidelity threat detections that withstand evasion attempts, with practical examples from real-world attacks and methodologies for effective detection development.
Explore social engineering techniques, their evolution, and practical applications in penetration testing. Learn from real-world examples and scenarios to enhance your security assessment skills.
Exploring vulnerabilities in autonomous vehicles: sensors, decision profiles, and potential exploits. Insights into connected vehicle programs and their security implications for future transportation systems.
Explore DYODE, a low-cost DIY data diode for securing Industrial Control Systems. Learn about its development, components, and applications in file transfer, Modbus data, and remote debugging.
Explore innovative hacking techniques using light and sound, from C2 channels and exfiltration to disrupting motion detectors and speech jamming. Learn advantages, disadvantages, and mitigation strategies for these unconventional attacks.
Exploring innovative approaches to monetize vulnerabilities and address product security issues through cybersecurity-backed short positions in financial markets.
Explore effective strategies for building resilience against social engineering threats, drawing insights from behavioral science and real-world applications in high-risk environments.
Explore techniques for evading Microsoft ATA in Active Directory environments, including threat detection bypasses, attack chain modifications, and strategies for maintaining domain dominance.
Explore open-source security orchestration using Adaptive Network Protocol (ANP) for efficient threat response, automated network defense, and improved visibility across multiple systems and clouds.
Explore virtual terminals, POS security, and payment fraud techniques. Learn about transaction vulnerabilities, card exploitation, and merchant-side risks in electronic payment systems.
Explore techniques for extracting sensitive data from browser memory dumps, including passwords and session tokens, with insights on potential solutions and vendor responses.
Explore security through design principles, examining real-world examples and innovative approaches to create safer digital environments and user interactions.
Explore the evolution and challenges of cybersecurity defense through historical analogies, myths, and modern-day realities in this thought-provoking keynote address.
Get personalized course recommendations, track subjects and courses with reminders, and more.