Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover untold stories, innovative bypasses, and social engineering techniques from 7 years of physical penetration testing. Gain insights into defeating security measures through real-world examples.
Explore browser isolation mechanisms, their effectiveness, and future directions for enhancing web application security against untrusted code and third-party attacks.
Explore detection-as-code principles for efficient security operations, leveraging version control, test-driven development, code reuse, and automated workflows in detection and response teams.
Comprehensive guide for effective security program implementation, focusing on vendor selection, value optimization, and marketplace insights from both client and vendor perspectives.
Explore techniques for attacking and defending Terraform infrastructure, including secret exfiltration and deploying malicious applications, with insights on mitigating vulnerabilities in cloud environments.
Explore graph-based ontologies and semantic reasoning to revolutionize security data analysis, consolidate information, and automate logical conclusions for more efficient cybersecurity workflows.
Explore the complexities of security patching through a game show format. Experts discuss challenges, policies, and solutions for effective patch management in modern enterprises.
Exploring the rise of coinminers: their impact, technical aspects, detection methods, and defensive strategies. Insights into tracking campaigns, profits, and future predictions for this emerging cybersecurity threat.
Explore the future of strong authentication with FIDO U2F and FIDO 2 standards, offering simplicity and security for online users while addressing the limitations of traditional hardware tokens.
Explore advanced mobile security techniques and real-world vulnerabilities in Instagram, with insights on bug bounty hunting, responsible disclosure, and prevention strategies in the software development lifecycle.
Exploiting Windows service accounts: mismanagement risks, detection techniques, and prevention strategies. Includes live demonstrations and introduces an open-source tool for vulnerability assessment in networks.
Explore the rise of targeted cyber attacks, their effectiveness, and economic advantages. Learn about real-world examples and strategies to counter this growing threat.
Deep dive into advanced access control approaches, exploring complexities, limitations of traditional methods, and new strategies for effective implementation in modern IT environments.
Explore advanced techniques for detecting polymorphic malware in real-time, including approximation matching algorithms and bloom filters. Compare efficiency and performance of various methods for fast identification and classification.
Humorous exploration of security failures and cynicism in the tech industry, highlighting common pitfalls and the challenges of creating truly secure systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.