Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Psychology
Digital Marketing
Video Editing
Songwriting: Writing the Lyrics
A Scuola con Raffaello
Food as Medicine
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore common media mistakes in IT security reporting, analyzing causes and bridging the gap between journalists and security professionals.
Explore payment application security, from business processes to technical risks. Learn about attack surfaces, crypto-based countermeasures, and real-world solutions to protect financial transactions.
Exploring thermal imaging in information security: hacking a FLIR E4 for enhanced resolution and uncovering surprising heat signatures from computers.
Explore NoSQL database vulnerabilities and exploitation techniques for MongoDB, CouchDB, and Redis using the NoSQL Exploitation Framework. Learn about injection attacks, security issues, and automated penetration testing methods.
Explores modern techniques for enhancing wireless rogue AP attacks, including network spoofing and authentication interception. Introduces a new toolkit for implementing advanced attack strategies.
Exploring TR-069/CWMP vulnerabilities in residential gateways and ACS software, demonstrating potential for mass exploitation of consumer devices through ISP management systems.
Explore malicious document attacks, their evolution, and impact on cybersecurity. Learn about real-world techniques and strategies for defending against targeted attacks in enterprise networks.
Explore cloud security vulnerabilities, focusing on side channel attacks in virtualized environments. Learn about Bernstein's attack and deduplication exploits, with insights on improving isolation techniques.
Explore GPRS Roaming eXchange (GRX) hacking, focusing on the Belgacom case and its implications for mobile user privacy and security in international communications.
Explore affordable and accessible power side channel attacks on microcontrollers using simple techniques and low-cost equipment, demystifying complex security vulnerabilities.
Explore the evolution and impact of cybersecurity as a national security issue, examining diverse global approaches and their implications for future policy and strategy.
Explore the process of reverse engineering and modding a vintage VTech computer to add save functionality, preserving childhood nostalgia while enhancing its capabilities.
Explore the evolution of cybersecurity attacks and defenses, from 2001 to 2016, and learn about proactive defense strategies for the future of information security.
Discover innovative techniques for detecting network breaches using honeytokens. Learn about Canarytokens and new methods to set tripwires without agents or hardware, improving your network security.
Explore cybercrime evolution over 30 years: changing motivations, increased stakes, persistent vulnerabilities, and enduring hacking techniques. Assess lessons learned and current security landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.