Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master essential OSINT techniques and reconnaissance tools to efficiently gather critical intelligence about organizational infrastructure and potential security vulnerabilities without active network engagement.
Master automated password cracking infrastructure setup with Ansible and libvirt/QEMU, focusing on system resilience, snapshots, and rollbacks for optimized hashcat operations.
Explore automated firewall management through Software Defined Networking and SMT solvers, enabling scalable security solutions that integrate with IDS systems without compromising network performance.
Master the art of fuzzer creation and vulnerability discovery, exploring buffer overflow exploitation techniques with hands-on demonstrations and practical exploit development strategies.
Discover how dynamic, short-lived database credentials enhance security and efficiency while minimizing vulnerabilities in database management systems and authentication protocols.
Explore effective strategies for securing and managing IoT and OT networks, addressing challenges in asset inventory, vulnerability assessment, and security control implementation.
Dive into a real-world social engineering case study where an expert demonstrates how he gained unauthorized access to a bank's systems through sophisticated phone manipulation techniques.
Discover essential strategies for protecting your digital footprint from social engineering attacks, learning how pentesters gather public information and implementing effective countermeasures.
Explore security vulnerabilities in medical device communications, focusing on pacemaker systems and practical solutions to protect patient safety and data privacy.
Explore software design lessons from the Ariane 5 rocket failure, examining testing, validation, and security principles to prevent catastrophic system failures in critical applications.
Discover how to build a secure web server by comparing responses from multiple servers across different operating systems to detect and prevent zero-day exploits and vulnerabilities.
Explore modern supply chain security challenges and solutions through DevSecOps principles, focusing on emerging threats, operational complexities, and practical defensive strategies for today's digital landscape.
Explore the challenges of fragmented threat actor naming conventions and discover how MITRE ATT&CK's framework can help standardize cybersecurity threat research and tracking.
Get personalized course recommendations, track subjects and courses with reminders, and more.