Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore SAP penetration testing techniques from Citrix environments, focusing on unique challenges and effective strategies for securing complex enterprise systems.
Explore the Metabrik Platform for rapid development of reusable security tools, enhancing efficiency and effectiveness in IT security practices.
Explore email security vulnerabilities and learn how a single compromised email can lead to business-wide exploitation. Discover protective measures and best practices.
Explore techniques for intercepting SAP Secure Network Communications (SNC) protected traffic, enhancing understanding of SAP security vulnerabilities and potential attack vectors.
Explore SAP server counter-attack strategies and security measures in this IT security conference talk, enhancing your understanding of SAP system defense mechanisms.
Explore techniques for reverse engineering ABAP code and analyzing malware in SAP systems, enhancing your ability to detect and mitigate security threats.
Explore strategies to safeguard SAP HANA systems against vulnerabilities and exploits, enhancing your organization's cybersecurity posture and protecting critical business data.
Explore behavioral game theory in defensive security, focusing on volatile memory and its implications for cybersecurity strategies and decision-making processes.
Explore rapid data destruction techniques for emergency situations, focusing on physical and digital methods to protect sensitive information in under a minute.
Explore Active Directory security best practices with experts Kuhn and Wiederkehr, covering essential strategies to protect your organization's critical infrastructure and data.
Explore techniques for pivoting through Microsoft Exchange servers using Ruler, enhancing penetration testing and security assessment capabilities in enterprise environments.
Explore cybersecurity insights and defense strategies with The Grugq in this thought-provoking talk from the TROOPERS17 conference on IT security.
Learn to generate network baselines for small security programs using Bropy, enhancing threat detection and response capabilities in resource-constrained environments.
Explore modern defense strategies using Device Guard, focusing on architectural approaches to enhance security in Windows environments.
Explore voice-activated systems' security vulnerabilities and potential exploits in this insightful presentation on the emerging risks of voice-controlled technology.
Get personalized course recommendations, track subjects and courses with reminders, and more.