Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Introducing Red Wizard: An open-source tool for automated, OPSEC-safe Red Team infrastructure deployment. Streamlines setup with user-friendly wizards, self-documentation, and resilient architecture for efficient cybersecurity testing.
Explore Automated Moving Target Defense using nomadic honeypots to create actionable Cyber Threat Intelligence. Learn deception techniques, attacker behaviors, and how to reduce attack surfaces while generating valuable threat insights.
Explore the evolution of cybersecurity training with expert trainers discussing market changes, pandemic impact, specialized courses, and tips for career advancement in this insightful panel discussion.
Exposé of common software security myths, debunking industry surveys, best practices, and popular concepts like "shift left" and SBOMs. Challenges conventional wisdom with evidence-based insights.
Demystifying antivirus software: internals, detection methods, and trade-offs. Explores AV engines, whitelists, signatures, real-time monitoring, and network inspection across Windows, Linux, and Android platforms.
Explore 30 years of hacking evolution and its impact on cybersecurity. Learn key insights and prepare for future challenges in the rapidly evolving landscape of digital security and cyberwarfare.
Unveiling critical vulnerabilities in leading SSL VPNs, including pre-auth RCEs and backdoors. Demonstrating exploitation techniques, post-exploitation strategies, and discussing mitigation measures for enterprise security.
Explore advanced mutation fuzzing techniques for wireless protocols, covering basics, new fuzzer development, and smart payload mutation. Includes demos on mobile, IoT, and automotive vulnerabilities.
Explores vulnerabilities in 5G/4G protocols affecting network operators and consumer devices. Demonstrates new hijacking, bidding down, and battery draining attacks using low-cost tools. Discusses worldwide testing results and potential fixes.
Explore techniques to evade static code analysis tools, including covert data flow, deep call stacks, and taint laundering. Learn how malicious code can be camouflaged to avoid detection.
Uncovers vulnerabilities in major phone brands' network settings, allowing attackers to manipulate user data. Demonstrates attack flows and discusses vendor mitigations for these security risks.
Explore PErfidious, a Python tool for PE file manipulation and shellcode injection. Learn about its capabilities in bypassing endpoint detection systems and its potential as a modern PE file analysis library.
Explore CNN-based methods for detecting manipulated facial images, including Deepfakes and face merging. Learn effective techniques using low-level and high-level features for automatic detection of facial manipulation.
Explore techniques for deceiving object detectors by comparing the attack process to neural network training. Learn how applying training techniques can improve adversarial attacks on state-of-the-art systems.
Demonstrating a systematic approach to reverse engineer and exploit car systems through CAN bus communication protocol analysis, packet spoofing, and payload crafting within a month-long prototype build.
Get personalized course recommendations, track subjects and courses with reminders, and more.