Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore data collection, analysis, and security techniques with experts Ventuzelo and Laucournet in this insightful conference talk from Hack.lu 2023.
Explore strategies for bridging the gap between Cyber Threat Intelligence and Security Operations Center teams, enhancing collaboration and threat response capabilities.
Explore collaborative approaches to building trustworthy, crowdsourced Cyber Threat Intelligence (CTI) in this insightful presentation from Hack.lu 2023.
Explore PHP filter chains for web security, understanding their mechanisms and potential exploits. Learn practical techniques to enhance application defenses against vulnerabilities.
Explore the impact of deepfakes, AI, and biometrics on identity in the digital age, examining challenges and potential solutions for security and privacy.
Explore the advantages of implementing ACME protocol for enhanced network security, focusing on its practical applications and impact on internet safety.
Explore file format intricacies, common pitfalls, and best practices for robust handling and parsing in this insightful presentation by security expert Ange Albertini.
Explore the creation of malicious phone charging stations, understanding potential security risks and vulnerabilities in public charging infrastructure.
Explore the security vulnerabilities and potential threats in embedded SIM technology, uncovering risks and implications for mobile communications and IoT devices.
Explore the resurgence of cyber-physical offensive capabilities and their implications for modern security landscapes in this insightful presentation by Daniel Kapellmann Zafra.
Explore techniques to bypass VPN Always-On security measures, uncovering potential vulnerabilities and network protection strategies.
Explore ongoing EvilEye campaigns targeting CCP adversaries, analyzing tactics, targets, and implications for cybersecurity professionals and policymakers.
Explore the impact of digital technologies on modern warfare and its implications for global security in this insightful presentation by Mauro Vignati.
Explore the importance of strategic threat intelligence, covering key concepts like CTI, Pyramid of Pain, and influence operations in cybersecurity and market expansion.
Explore ethical approaches to internet-wide scanning, including best practices, vulnerability assessment, and measuring risk exposure in the digital landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.