Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore innovative security solutions for distributed workforces, addressing challenges in user protection, monitoring, and maintaining a secure environment in cloud-based and remote work settings.
Explore the first cross-platform Cobalt Strike re-implementation, Vermilion Strike, targeting both Linux and Windows in real-world attacks. Learn about this significant malware discovery.
Explore JavaScript obfuscation techniques and learn a method for detecting packers to identify obfuscated files, crucial for understanding modern security threats.
Explore the development of Hermes, a Swift implant for macOS red teaming, integrated with Mythic C2 framework. Learn about its capabilities and detection methods using Apple's ESF.
Comprehensive overview of WireGuard: its implementation, protocol, cryptography, and comparison with other VPN solutions. Learn when and how to use this efficient end-to-end encryption tool.
Challenging elitism in cybersecurity, this talk advocates for inclusivity and rethinking entry barriers to address growing demand and burnout in the field.
Panel discussion exploring security-focused TikTok creators' experiences in bringing hacking awareness, humor, and community to a new audience, highlighting successes and challenges in this emerging frontier.
Insightful discussion on building and scaling top security teams, exploring strategies for talent attraction, retention, and overcoming challenges in the cybersecurity industry.
Explore "Webhook Boomerang flaws" and learn how to exploit SSRF vulnerabilities in API webhooks, potentially compromising cloud credentials despite security measures.
Uncover the alarming spread of exposed API keys and secrets in public repositories. Learn about research findings, causes, and implications for cybersecurity.
Discover how secure code defaults can significantly reduce XSS vulnerabilities and elevate overall security. Learn strategies to implement effective guardrails and minimize recurring security risks.
Discover Marie Kondo-inspired techniques for managing security challenges efficiently. Learn about useful tools and lessons to avoid reinventing the wheel in under-resourced security teams.
Explore practical applications of machine learning in threat hunting and detection, featuring case studies of high-value detections from two years of research and implementation.
Discover strategies for security engineers to collaborate with product managers, enhancing security features, accelerating team growth, and unlocking revenue from security-conscious customers.
Strategies for creating effective security documentation that people will read and use. Covers identifying needs, iterative creation, and measuring success in technical writing.
Get personalized course recommendations, track subjects and courses with reminders, and more.