Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore behavioral heuristics and their application in red team operations, enhancing adversary simulation techniques for improved cybersecurity posture.
Explore post-quantum cryptography's role in defending against future quantum hackers, covering motivations, challenges, and practical implementations like Open Quantum Safe.
Discover M33tfinder: a tool for identifying vulnerable web applications. Learn offensive security techniques from an experienced researcher in this informative conference talk.
Explore mainframe hacking techniques with expert Philip Young, covering security vulnerabilities, testing tools, and strategies to enhance mainframe protection in modern environments.
Explore cryptographic techniques and best practices for secure programming in embedded systems with expert Thomas Pornin, author of BearSSL library.
Explore SOC counter-attack strategies using the MITRE ATT&CK framework. Learn threat detection, modeling, and hunting techniques to enhance your organization's security posture.
Explore how global geopolitical awareness enhances threat hunting, enabling the discovery of new surveillanceware and nation-state malware in mobile security intelligence.
Explore the evolution of Wajam from startup to widespread adware, uncovering its tactics and impact on users' systems through malware researcher Hugo Porcher's analysis.
Explore mobile surveillance-ware xRAT, used for monitoring Chinese interests abroad. Learn about threat detection, reverse engineering, and emerging mobile security challenges.
Explore Iran's internet landscape, including censorship, surveillance, and the impact of foreign tech companies. Learn about challenges faced by Iranians and efforts to improve accessibility and security.
Explore video game hacks and glitches, drawing parallels to modern security vulnerabilities. Learn how gaming exploits relate to real-world cybersecurity challenges.
Explore cache attacks, SGX technology, and tools for writing constant-time code to protect confidential data from side-channel vulnerabilities in various computing contexts.
Explore stealthy techniques for effective red team operations, including lateral movement, phishing, and post-exploitation strategies to evade detection and succeed in penetration testing.
Explore SMT solvers for binary analysis and code deobfuscation in IT security. Learn practical applications, limitations, and solutions for enhancing malware analysis capabilities.
Explore advanced CMD obfuscation techniques used by threat actors, including string manipulation and encoding methods. Learn to create and detect complex obfuscated payloads using the Invoke-DOSfuscation framework.
Get personalized course recommendations, track subjects and courses with reminders, and more.