Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Hands-on guide for implementing Atomic Red Team, covering setup, execution, and best practices for effective cybersecurity testing and threat emulation.
Learn efficient techniques for analyzing Android malware, focusing on smart and time-saving approaches to reverse engineering and threat assessment.
Discover a fast-paced, backlog-based approach to threat modeling in DevSecOps environments without slowing development or requiring additional tools. Learn to implement effective security practices efficiently.
Exploring software-defined cryptography through multi-party computation, addressing enterprise key management challenges and enabling innovation in data protection and privacy.
Exploring targeted attacks on human rights defenders, evolving threats, and Amnesty International's response strategies. Insights on digital surveillance and tools for protecting vulnerable activists.
Explore Kubernetes security vulnerabilities through hands-on recon and exploitation of clusters, sidecars, and supporting infrastructure. Learn practical techniques for compromising and persisting in real-world K8s environments.
Exploring AMITT framework for detecting and countering disinformation, using InfoSec tools to develop operational playbooks and strategies for addressing influence operations at scale.
Secure account recovery strategies for 2FA-enabled systems, balancing user experience, security, and support efficiency. Explores various methods and best practices across industries.
Extending IDA with Dynamic Data Resolver plugin for improved malware analysis. Instrumenting binaries using DynamoRIO to resolve dynamic values, find jump locations, and patch anti-analysis functions.
Explore secure customer identity management in call centers, focusing on authentication methods, challenges, and best practices for protecting sensitive information.
Explore elliptic curve cryptography, Bitcoin wallets, and key management in this security researcher's talk on innovative cryptographic techniques and their applications.
Explore web caching vulnerabilities and attacks, including Edge Side Include Injection, with insights from a seasoned security consultant and CTF participant.
Explore cybersecurity's global impact with Matt Mitchell, a renowned hacker and privacy expert. Learn about digital safety, privacy tools, and community-focused security initiatives.
Explore DNS-based threats and advanced security techniques with Talos researchers Warren Mercer and Paul Rascagnères. Learn about cutting-edge malware detection and threat intelligence in network security.
Get personalized course recommendations, track subjects and courses with reminders, and more.