Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore insights from an 18-month IoT honeypot study, revealing vulnerabilities and attack patterns in connected devices. Gain valuable knowledge for enhancing IoT security.
Explore vulnerabilities in industrial robots, uncovering potential security risks and attack vectors. Learn about the implications for safety and productivity in automated manufacturing environments.
Explore yacht cybersecurity vulnerabilities and hacking techniques in this talk on maritime IoT threats, offering insights for securing connected vessels.
Explore IPv6 implementation challenges in cloud environments, addressing potential setbacks and strategies for successful deployment in modern network infrastructures.
Explore IPv6 address management strategies and lessons learned over five years, covering challenges, best practices, and future considerations for network administrators and security professionals.
Explore MIPS and MIPS16 architecture quirks, focusing on delay slots and their impact on emulation. Learn techniques to frustrate reverse engineering efforts in embedded systems.
Explore challenges in securing next-generation wearables, focusing on in-ear fitness coaches. Learn about potential vulnerabilities and strategies for hardening these innovative IoT devices.
Explore cutting-edge techniques for IPv6 network reconnaissance, focusing on recent advancements and their implications for security professionals and network administrators.
Explore JSON injection vulnerabilities in modern password recovery systems, uncovering potential security risks and learning effective mitigation strategies.
Explore techniques for uncovering cryptographic vulnerabilities in SAP systems, enhancing security awareness and protection strategies for enterprise software environments.
Explore SAP security patch management, addressing challenges and providing effective solutions for maintaining robust system protection.
Explore SAP Hana application vulnerabilities and security measures from a penetration tester's perspective. Learn effective hacking techniques and defensive strategies to enhance your SAP infrastructure's resilience.
Explore techniques for manipulating Windows trust mechanisms, including code signing and execution policies, to bypass security controls and elevate privileges.
Explore network monitoring techniques to enhance visibility in industrial control systems, overcoming host-level limitations for improved security and threat detection.
Explore vulnerabilities in SAP's Internet Graphics Server (IGS), a critical but often overlooked component. Learn about potential security risks and mitigation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.