Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into real-world cyber attack scenarios and defense strategies, exploring adversary tactics, stealth techniques, and effective detection methods for enhanced security operations.
Discover effective techniques for detecting cyber threats in OT environments using Windows-compatible batch scripts, focusing on methods that work across legacy and modern systems without compromising operations.
Delve into the mechanics and exploitation of the critical GLIBC heap overflow vulnerability (CVE-2023-6246), exploring privilege escalation techniques and practical heap overflow concepts.
Discover how eBPF revolutionizes Runtime Application Security, addressing long-standing challenges in performance, maintenance, and implementation effectiveness for modern security solutions.
Discover how to exploit Modbus protocol vulnerabilities in industrial systems through live demonstrations of Man-in-the-Middle attacks, data dumping, and PLC DoS using Python scripts on real hardware.
Discover 10 unique macOS persistence techniques, from common admin methods to lesser-known approaches, with practical detection strategies for IT security professionals.
Explore the critical differences between anonymization and pseudonymization in GDPR compliance, featuring hash-based and encryption-based protocols for secure data handling.
Explore the security implications of parser differentials in JSON and other formats, learning how fuzzing techniques can identify inconsistencies between multiple parsers for potential exploits.
Explore AI security from a hacker's perspective, covering vulnerability classes, attack patterns, and defensive strategies, with practical demos and prompts for security practitioners.
Explore the intersection of music and hacking through synthesizer platforms, discovering how to create custom sound processors and unique instruments using development boards and coding.
Discover how machine learning and neural networks can effectively categorize web content at scale, enhancing organizational security through URL-based classification and employee browsing risk assessment.
Discover how to exploit ICMPv6 protocol vulnerabilities to manipulate network traffic, exploring proof-of-concept attacks against Windows and CentOS systems through legitimate protocol functionalities.
Discover proactive methods for identifying insider threats using EDR solutions, focusing on unique threat hunting techniques to detect potential rogue personnel within organizations.
Discover how to build a stealthy Rust-based Windows application that bypasses modern security protections, including sandbox analysis, browser protection, and endpoint security measures.
Explore the evolving landscape of injection attacks beyond OWASP TOP 10, understanding diverse attack vectors and why this security threat remains persistently challenging.
Get personalized course recommendations, track subjects and courses with reminders, and more.