Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the creation of BSidesSF's Astronaut Badge, from technical aspects to logistics, and learn about innovative PCB printing with colorful artwork.
Explore a counterintuitive approach to strengthening security by ignoring over 90% of vulnerability alerts, enabling improved workflows and behavior in supply chain security management.
Explore browser isolation mechanisms, their effectiveness, and future directions for enhancing web application security against untrusted code and third-party attacks.
Explore detection-as-code principles for efficient security operations, leveraging version control, test-driven development, code reuse, and automated workflows in detection and response teams.
Comprehensive guide for effective security program implementation, focusing on vendor selection, value optimization, and marketplace insights from both client and vendor perspectives.
Explore techniques for attacking and defending Terraform infrastructure, including secret exfiltration and deploying malicious applications, with insights on mitigating vulnerabilities in cloud environments.
Explore graph-based ontologies and semantic reasoning to revolutionize security data analysis, consolidate information, and automate logical conclusions for more efficient cybersecurity workflows.
Explore the complexities of security patching through a game show format. Experts discuss challenges, policies, and solutions for effective patch management in modern enterprises.
Exploring the rise of coinminers: their impact, technical aspects, detection methods, and defensive strategies. Insights into tracking campaigns, profits, and future predictions for this emerging cybersecurity threat.
Explore the future of strong authentication with FIDO U2F and FIDO 2 standards, offering simplicity and security for online users while addressing the limitations of traditional hardware tokens.
Explore advanced mobile security techniques and real-world vulnerabilities in Instagram, with insights on bug bounty hunting, responsible disclosure, and prevention strategies in the software development lifecycle.
Exploiting Windows service accounts: mismanagement risks, detection techniques, and prevention strategies. Includes live demonstrations and introduces an open-source tool for vulnerability assessment in networks.
Explore the rise of targeted cyber attacks, their effectiveness, and economic advantages. Learn about real-world examples and strategies to counter this growing threat.
Deep dive into advanced access control approaches, exploring complexities, limitations of traditional methods, and new strategies for effective implementation in modern IT environments.
Explore advanced techniques for detecting polymorphic malware in real-time, including approximation matching algorithms and bloom filters. Compare efficiency and performance of various methods for fast identification and classification.
Get personalized course recommendations, track subjects and courses with reminders, and more.