Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for building secure GraphQL APIs, including security as a core feature, developer tools for secure applications, and effective request logging techniques.
Explore the power of regular expressions in infosec, from theory to practical implementation, and learn why they're crucial for security professionals.
Discover cost-effective, open-source solutions for hyper-scale threat detection, processing 45TB+ logs daily. Learn to enhance security monitoring without expensive SIEM platforms.
Explores challenges and benefits of integrating cybersecurity from project inception, offering insights on overcoming resistance, developing secure designs, and building value chains in early-stage cybersecurity implementation.
Explore mainframe security, vulnerabilities, and exploitation techniques in critical business applications used by Fortune 500 companies for ATMs, taxes, and travel bookings.
Explore BabbelPhish, an innovative approach using large language models to bridge natural language queries and security DSLs, streamlining threat detection and making detection-as-code platforms more accessible.
Explore insights from cyber crisis investigations, focusing on prevention, impact reduction, and effective response strategies. Learn from real-world case studies to enhance organizational readiness.
Explore diverse journeys from military to hacking, and from hacking to government, highlighting how varied experiences strengthen cybersecurity efforts and protect the public.
Introducing a Capability Maturity Model for Red Teams to assess readiness, plan growth, and communicate effectiveness to leadership, enhancing organizational security.
Innovative OSINT techniques reveal critical RDP vulnerabilities, including remote code execution and security bypasses, without conventional reverse engineering tools. Explore unconventional research methodologies and vulnerability analysis.
Explore an end-to-end process for coordinating Red Team cybersecurity testing, including onboarding, prioritization, resource allocation, and communication strategies to enhance organizational efficiency.
Explore strategies for navigating cybersecurity challenges in organizations, understanding human behavior, and negotiating better decision-making when faced with resistance to implementing security solutions.
Learn to prioritize red team findings with the Common Red Team Findings Score System (CRTFSS), enhancing cybersecurity assessment and decision-making processes.
Explore advanced code injection techniques and zero-day vulnerabilities without writing code. Learn cutting-edge cybersecurity strategies for identifying and exploiting system weaknesses.
Explore software-defined radio exploits and their implications for wireless security in this comprehensive presentation on cutting-edge RF technology and potential vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.