Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Japan's cybersecurity landscape, challenges, and unique solutions in this insightful international tour led by Ben Ellis.
Explore encryption vulnerabilities, software development challenges, and security frameworks to enhance your understanding of cybersecurity risks and mitigation strategies.
Explore the dangers of stalkerware on mobile devices and learn effective detection and prevention strategies to protect your privacy and security.
Exploiting security tools: Learn how vulnerability scanners and NAC solutions can be manipulated, common misconfigurations, and methods to capture enterprise credentials. Includes demos and remediation strategies.
Innovative approach to assessing security in air-gapped, proprietary systems, addressing unique challenges and threat vectors in isolated environments.
Learn to extract and reconstruct network traffic data using NetworkMiner, enhancing your understanding of internet data transmission and streamlining the process of bulk resource extraction from packet captures.
Decoding security vendor buzzwords: Learn to interpret AI, data-driven, and advanced analysis claims. Gain insights to critically evaluate product capabilities and ask informed questions about underlying technologies.
Discover strategies for preventing application attacks through automation, enhancing security beyond traditional mitigation and detection methods.
Learn to create a pentesting tool using Python and the Shodan API. Explore the journey of a security professional's first coding project, from basic functions to advanced features.
Explore GPU-accelerated file carving techniques to enhance digital forensics efficiency, with insights on improving open-source tools and introducing novel methods for faster data recovery.
Discover essential Windows artifacts for forensic investigations without event logs. Learn to leverage prefetch files, registry keys, and browser data for effective incident response.
Explore the risks of shared usernames across services and their significance in OSINT investigations, challenging assumptions about username disclosure and recycling.
Explore the recurring issues in InfoSec and learn strategies to make cybersecurity more accessible and inclusive, challenging traditional approaches.
Explore the hidden world of consumer-grade surveillance tools and their impact on privacy, based on months of research into the stalkerware industry's technical and non-technical aspects.
Dive into the intricacies of Emotet, the notorious and evolving malware family. Learn about its sophisticated operation, components, and the investigative techniques used to reverse engineer this digital threat.
Get personalized course recommendations, track subjects and courses with reminders, and more.