Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how CCTV camera blind spots create security vulnerabilities through location-based confidence weakness, and learn about TipToe - a novel evasion attack demonstrating detection flaws across various conditions.
Explore the critical relationship between aviation safety and cybersecurity standards, from DO-178 to DO-356A, understanding system design principles, assurance levels, and threat modeling in modern aircraft systems.
Discover practical strategies to detect and defend against digital deception across network layers, from electromagnetic spoofing to false narratives, while developing critical skills to discern truth in our interconnected world.
Discover Recursive Request Exploits (RRE), a new attack methodology that bypasses authentication and payment controls by weaponizing interdependent web requests to exploit logic flaws.
Explore 40 years of Phrack magazine's impact on hacker culture, underground publishing, and information security evolution through expert panel discussion.
Uncover critical vulnerabilities in EV charging protocols through power-line communication exploits targeting QCA 7000 HomePlug modems used in CCS and NACS systems.
Master the complete physical penetration testing lifecycle, from reconnaissance to actionable reporting, with real-world war stories and professional methodologies.
Discover how to exploit web conferencing protocols for covert command & control, using TURNt tool to create high-bandwidth C2 channels that mimic legitimate Zoom traffic.
Discover how modern purple teaming transforms security through unified strategies, intelligence-driven collaboration, and realistic adversary emulation to improve defenses.
Explore methods for identifying AI-generated, photoshopped, and GAN-created deepfakes through live demonstrations of over a dozen detection techniques and free analysis tools.
Uncover critical vulnerabilities in ISP modems threatening global infrastructure, learn detection techniques, and develop defenses against systemic security failures.
Discover advanced red team networking techniques using stateless tunnels like GRE and VxLAN for initial access without phishing, plus evasion methods and VxLAN vulnerabilities.
Explore the dynamics between security researchers and vulnerability triagers in bug bounty programs, learning strategies for better communication, dispute resolution, and collaboration.
Explore Go malware analysis challenges in IoT environments, learn practical reverse engineering techniques, and examine the Pumabot botnet case study.
Discover novel methods to exploit Microsoft's legitimate login domain for phishing attacks using unpatchable functionality in this DEF CON security research presentation.
Get personalized course recommendations, track subjects and courses with reminders, and more.