Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Efficiently assess Active Directories at any scale using proven techniques and tools for comprehensive security evaluations and vulnerability detection.
Learn to conduct automotive penetration testing using Scapy, enhancing your skills in identifying and exploiting vulnerabilities in vehicle networks and systems.
Explore the inner workings of machines in this insightful keynote, delving into technological intricacies and their implications for cybersecurity and digital innovation.
Explore recent IPv6 developments from IETF, including protocol updates, security enhancements, and implementation strategies for network professionals and enthusiasts.
Explore the intricacies, challenges, and entertaining aspects of VDSL technology in this engaging presentation on modern telecommunications infrastructure.
Explore the latest features and capabilities of SI6 IPv6 Toolkit v3.0 for network security testing and IPv6 protocol analysis.
Explore the intricacies and potential security implications of IPv6, the next-generation Internet Protocol, in this comprehensive technical analysis.
Explore the intricacies and hidden capabilities of MS Office file formats, uncovering potential vulnerabilities and advanced techniques for manipulation.
Explore ethical considerations for security professionals, focusing on practical decision-making frameworks and real-world scenarios to navigate complex moral dilemmas in the field.
Explore common vulnerabilities in encrypted VoIP systems, focusing on SIP-over-TLS and sRTP protocols. Learn to identify and mitigate security risks in voice communication networks.
Explore the evolution of IoT botnets, focusing on Torii and smart-home vulnerabilities. Gain insights into emerging threats and security implications for connected devices.
Explore the development and advancements of kernel fuzzers in NetBSD, focusing on techniques for identifying vulnerabilities and improving system security.
Explore techniques for escalating privileges on macOS using seemingly harmless App Store applications, uncovering potential security vulnerabilities in the operating system.
Explore VXLAN security vulnerabilities, injection techniques, and protective measures for network administrators and security professionals.
Explore the security vulnerabilities of smartwatches for children and their potential impact on safety. Learn about the risks and implications of these wearable devices.
Get personalized course recommendations, track subjects and courses with reminders, and more.