Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive introduction to automotive cybersecurity, exploring vulnerabilities in modern car systems and techniques for identifying and exploiting potential weaknesses.
Explore strategies for achieving pharmaceutical compliance in cloud computing environments, addressing regulatory challenges and best practices for data security and integrity.
Explore homemade tools for testing mobile devices and monitoring networks, covering interception techniques, firmware analysis, and hardware auditing for enhanced security understanding.
Explore Microsoft's transition to IPv6-only networks, covering industry pressures, implementation challenges, and key lessons learned in this technical deep dive.
Explore Faction, a modern multiplayer C2 framework. Learn its modular design, accessibility, and key features through live demos and in-depth explanations of its components and functionality.
Explore designing implants and payloads for ICS embedded devices, covering discovery, attack design, and damage stages in cyber-physical attacks on industrial control systems.
Explore side channel attacks on low-cost hardware, covering power analysis, encryption vulnerabilities, and practical demonstrations. Learn acquisition techniques and countermeasures.
Explore APT operations security failures, from minor mistakes to catastrophic blunders, in this eye-opening analysis of real-world cybersecurity incidents and their consequences.
Explore security vulnerabilities in parcel delivery systems and learn strategies to protect against potential threats in this insightful IT security conference talk.
Explore security vulnerabilities in Ultra-Wideband technology for smartphones, analyzing potential attacks and their implications for user privacy and device security.
Explore fact-based post-exploitation techniques for Office365 with Melvin Langvik. Learn advanced IT security strategies to enhance your organization's defenses against cyber threats.
Explore the intersection of fitness and cybersecurity as Axelle Apvrille demonstrates how to hack a jump rope, revealing potential vulnerabilities in smart fitness devices.
Explore forensic techniques for Ceph storage systems, focusing on data recovery, artifact analysis, and security implications in distributed environments.
Explore IT security strategies through the lens of cat-and-mouse games and chess, examining tactical approaches for effective cybersecurity in this conference talk by Fabian Mosch.
Explore practical detection engineering strategies for multi-cloud environments, focusing on real-world applications and innovative approaches to enhance IT security across diverse platforms.
Get personalized course recommendations, track subjects and courses with reminders, and more.