Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explora las complejidades y desafÃos del mercado de vulnerabilidades de seguridad, analizando estrategias de compra, valoración y negociación en este fascinante sector.
Introducción al hardware hacking: herramientas, reconocimiento y ataques. Aprende técnicas prácticas para explorar y manipular dispositivos electrónicos con el experto Emmanuel Seoane.
Análisis interactivo de incidentes de seguridad en contratos Solidity, explorando perspectivas de desarrolladores y atacantes para mejorar la comprensión y mitigación de vulnerabilidades en blockchain.
Explore Faraday, an innovative tool designed to facilitate knowledge sharing in cybersecurity. Learn its features and applications from expert developers at Ekoparty 2010.
Explore iPhone rootkit development techniques and potential security vulnerabilities in iOS devices, presented by Eric Monti at Ekoparty 2010.
Exploración detallada de vulnerabilidades en productos Microsoft, analizando técnicas de explotación y medidas de seguridad para desarrolladores y profesionales de TI.
Explore various lockpicking techniques including raking, lifting, and jiggling. Learn to differentiate between methods and understand their applications in physical security assessment.
Explore advanced techniques for penetration testing VMware environments, focusing on vulnerabilities and security challenges specific to virtualized infrastructures.
Explore advanced pentesting techniques and methodologies with cybersecurity expert Chema Alonso in this insightful conference talk from Ekoparty 2010.
Exploración de vulnerabilidades y técnicas de ataque en sistemas VoIP, revelando riesgos de seguridad y estrategias de protección en comunicaciones de voz sobre IP.
Explore network-based detection techniques for identifying structural anomalies in Portable Executable (PE) files, enhancing cybersecurity defenses against malware threats.
Explore cutting-edge techniques in embedded VR security, focusing on router vulnerabilities, reverse engineering, and exploit development through real-world case studies.
Explore the creation process of the first Defcon Aerospace Village badge, from design to production. Learn how to recreate your own using open-source resources and insider insights.
Explore industrial cybersecurity challenges in IIoT and smart factories. Learn about automation pyramids, network segmentation, and threat landscapes to enhance IT-OT security in Industry 4.0 environments.
Explora prácticas de seguridad SSH en DevSecOps, desde autenticación hasta Zero Trust, con enfoque en entornos Cloud y ciclo de vida de aplicaciones.
Get personalized course recommendations, track subjects and courses with reminders, and more.