Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into advanced Linux-targeted cyber threats, examining Lazarus Group's AppleJeus campaign, DTrack malware evolution, and emerging cryptocurrency theft tactics in modern cybersecurity.
Discover modern techniques for local privilege escalation in internal networks, exploring alternative methods beyond traditional approaches for effective lateral movement and access elevation.
Discover 5 simple but interesting bugs and lessons learned from a beginner's first year in bug bounty hunting, earning $0-16k and finding CVEs.
Discover how to analyze and contain cryptomining threats through expert insights from cybersecurity professionals at BSides Budapest 2025.
Delve into an analysis of disrupted Ukrainian bot farm operations, exploring security vulnerabilities, attack methodologies, and real-world implications for industrial control systems.
Explore the hidden security implications of UPnP and network convenience features through an expert analysis of default configurations and their potential risks in modern networks.
Dive into real-world cyber attack scenarios and defense strategies, exploring adversary tactics, stealth techniques, and effective detection methods for enhanced security operations.
Discover effective techniques for detecting cyber threats in OT environments using Windows-compatible batch scripts, focusing on methods that work across legacy and modern systems without compromising operations.
Delve into the mechanics and exploitation of the critical GLIBC heap overflow vulnerability (CVE-2023-6246), exploring privilege escalation techniques and practical heap overflow concepts.
Discover how eBPF revolutionizes Runtime Application Security, addressing long-standing challenges in performance, maintenance, and implementation effectiveness for modern security solutions.
Discover how to exploit Modbus protocol vulnerabilities in industrial systems through live demonstrations of Man-in-the-Middle attacks, data dumping, and PLC DoS using Python scripts on real hardware.
Discover 10 unique macOS persistence techniques, from common admin methods to lesser-known approaches, with practical detection strategies for IT security professionals.
Explore the critical differences between anonymization and pseudonymization in GDPR compliance, featuring hash-based and encryption-based protocols for secure data handling.
Explore the security implications of parser differentials in JSON and other formats, learning how fuzzing techniques can identify inconsistencies between multiple parsers for potential exploits.
Explore AI security from a hacker's perspective, covering vulnerability classes, attack patterns, and defensive strategies, with practical demos and prompts for security practitioners.
Get personalized course recommendations, track subjects and courses with reminders, and more.