Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn techniques for applying cyber threat intelligence and hunting adversaries in digital environments with expert John Bambenek.
Explore the future of application security with David Brumley's insightful keynote, discussing AI's role and potential impact on human involvement in AppSec.
Explore the future of application security and its potential shift towards automation in this thought-provoking keynote by David Brumley of Forallsecure at CanSecWest 2022.
Explore cutting-edge cybersecurity insights and innovations from industry experts at this premier conference, focusing on artificial intelligence's role in advancing security measures.
Explore techniques for evading Falco detection in Kubernetes clusters, learning how to compromise systems without alerting security operations centers.
Explore cutting-edge cybersecurity insights and innovations from industry experts at the premier CanSecWest conference, featuring talks on emerging threats and defensive strategies.
指紋認証システムのハッキング手法を解説。古典的な研究でありながら、現代にも通用する貴重な情報を提供。セキュリティ専門家向けの高度な内容を日本語で解説。
Explore vulnerabilities in fingerprint recognition systems and learn techniques to bypass biometric security measures in this classic presentation from PACSEC 2006.
Early RFID security research by Adam Laurie, exploring vulnerabilities in RFID passports and predicting the need for RFID-blocking wallets. A pioneering look at RFID technology's security implications.
Explore automated security analysis techniques for IoT firmware, uncovering vulnerabilities and potential threats in connected devices at scale.
Explore the potential risks of AI voice technology abuse and learn about cutting-edge research in algorithm-based attacks, with insights from Tencent researchers.
Explore modern disinformation tactics and their impact on security operations centers, with insights on analyzing and countering these threats in today's complex information landscape.
Insightful interview with Project Zero's Natalie Silvanovich, exploring her expertise in exploit research and cybersecurity. Gain valuable insights into vulnerability discovery and cutting-edge security practices.
Renowned security researcher Thomas Dullien explores notable exploits, offering insights into vulnerability analysis and exploitation techniques in this engaging presentation.
Renowned security researcher Thomas Dullien explores notable exploits in this insightful talk, offering valuable insights for cybersecurity professionals and enthusiasts.
Get personalized course recommendations, track subjects and courses with reminders, and more.