Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Crash course on Section 230: its purpose, function, and importance for online content. Learn why this law is crucial for protecting internet freedom and innovation from a legal expert.
Explore Banjo, a Binary Ninja plugin for interactive Smali disassembly, enhancing Android app reverse engineering with features like references, graph mode, and Python 3 API.
Exploring Software Bill of Materials (SBOM) concept, its potential impact on software supply chain transparency, and its crucial role in enhancing healthcare sector security. Insights on implementation and overcoming reluctance.
Explore the modern phishing landscape, its economy, and key players. Learn about phishing kit authors, their tactics, and strategies to combat this persistent cybersecurity threat.
Discover techniques for identifying unusual network behavior using Python. Learn to create custom tools for anomaly detection, scaling approaches, and data analysis in complex network systems.
Explore PCIe device reverse engineering, focusing on SR-IOV standard. Learn techniques to analyze vulnerabilities and extract valuable information from these interconnected components.
Explore legal protection of incident reports through attorney-client privilege. Learn when it applies, its limitations, and best practices for collaborating with attorneys during security incidents.
Overview of post-quantum cryptography and its practical applications in securing today's data against future quantum threats. Includes lessons from real-world integrations and demonstrations of quantum-safe alternatives.
Examination of persistent encryption failures in law enforcement radio systems, exploring protocol vulnerabilities, implementation issues, and challenges in improving security practices for deployed systems.
Explore ethical considerations in offensive security campaigns, including impacts on company morale, deception tactics, and maintaining professional integrity. Learn best practices for conducting ethical red team engagements.
Strategies for bridging the gap between InfoSec job seekers and employers. Insights on challenges, tactics for success, and collaboration in the cybersecurity job market.
Explore the latest tricks used by online scammers and learn three crucial OpSec strategies to protect yourself in an increasingly hostile digital environment.
Explore the hidden offensive capabilities of Vim for red team engagements. Learn how this popular text editor can be leveraged as a powerful tool in unconventional security operations.
Presentation of data from analysis of 6000+ firmware images, revealing trends in software hardening and a critical flaw in Linux/MIPS stack affecting security across embedded devices.
Explores how traditional security measures fail victims of domestic violence and the need to rethink security approaches for vulnerable populations facing proximity-based threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.