Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how a single Outlook registry setting sparked the creation of a powerful C2 framework used in red team operations against major corporations worldwide.
Discover how to revolutionize threat hunting using Python, Pandas, and data science techniques to overcome SIEM limitations and detect advanced adversarial activities more effectively.
Explore how to create custom Identity Providers using OpenID Connect to bypass MFA and establish persistence in Entra ID, including attack techniques and defense strategies.
Discover how attackers breached Snowflake's defenses, exposing 165+ customers' data, and learn actionable detection strategies to secure your cloud against evolving SaaS threats.
Discover Harbinger, an AI-powered platform that streamlines red and purple team workflows by integrating tools, automating playbooks, and providing intelligent attack path suggestions.
Discover how to build LLM-based AI agents for security workflows using Python, covering reasoning loops, critic agents, and autonomous systems for blue and red team operations.
Explore how malware loaders evolve to bypass AI, EDR, and sandboxes, examining their commoditization and advanced evasion techniques in modern cyberattacks.
Discover 5 critical mistakes that Security Operations Centers make and learn how to avoid these common blue team pitfalls in cybersecurity defense.
Explore advanced phishing techniques and anti-phishing defenses, including URL scanning, browser extensions, and how attackers bypass protections using tools like Evilginx Pro.
Dive into macOS forensic analysis from basics to advanced techniques, covering plists, logs, metadata, persistence vectors, and malware analysis tools for security professionals.
Explore how AI-generated malware evades detection and learn proactive threat intelligence strategies to anticipate and counter emerging AI-driven cyber attacks.
Discover advanced lateral movement techniques that bypass modern EDR detection, moving beyond traditional tools like PsExec to execute stealthy payloads across compromised networks.
Explore advanced C2 communication techniques, beacon detection methods, and evasion strategies using popular frameworks to enhance network security defense capabilities.
Explore AI security threats and defense strategies through real-world attack case studies, learning to identify vulnerabilities and implement practical countermeasures for AI systems.
Discover how to build Nemesis 2.0, an automated file analysis platform for red teams that processes, enriches, and triages files like an offensive VirusTotal system.
Get personalized course recommendations, track subjects and courses with reminders, and more.