Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for detecting and preventing data breaches, focusing on silent exits and evolving security mindsets in an interconnected business landscape.
Explore APT OpSec failures, uncovering personal connections, privacy issues, and confirmed links in cyber espionage operations. Gain insights into evolving tactics and vulnerabilities.
Explore KasperskyOS: a secure-by-design platform for ICS protection. Learn about its hypervisor, PLC safeguards, and network security features for robust industrial cybersecurity.
Evaluation of defence mechanisms for cyber-physical systems using attack tools, focusing on distributed attack detection in industrial control systems and SWAT network architecture.
Explore Fortinet's Security Fabric for OT, addressing IT-OT convergence challenges and offering integrated solutions for industrial cybersecurity in the evolving digital landscape.
Explore key technologies in Kaspersky Endpoint Security Cloud for Windows, macOS, and smartphones, including threat protection, encryption, and device control features.
Explore information warfare, decision-making processes, and cyber threats in this talk by the Grugq. Learn to navigate the complexities of modern information landscapes and protect against potential risks.
Explore industrial technology's rapid evolution, its impact on cybersecurity, and the challenges of innovation, data management, and intelligent infrastructure in the digital age.
Explore cyberphysical threats to water systems, focusing on urban infrastructure, digital ICS, and detection methods using deep learning and specialized tools.
Explore managed detection and response models for industrial control systems, covering operational technology, targeted attacks, and implementation stages for enhanced cybersecurity.
Explore Android's evolving defenses against ransomware, from KitKat to Nougat, and learn about system improvements and proactive measures to protect devices, data, and user experience.
Explore the convergence of IT and OT, their historical separation, and the challenges posed by IoT. Learn about the need for adapting security practices in both domains.
Explore undocumented MS Word features exploited by attackers, focusing on remote picture links and their potential for profiling activities. Learn detection methods and threat actor insights.
Explore security vulnerabilities in IoT devices through live demonstrations, uncovering root access on routers, toys, and cameras. Learn about the importance of penetration testing and responsible disclosure.
Experts discuss evolving cyberthreats, their impact on enterprises, and practical strategies for protection. Learn about advanced threats and how technology, processes, and security intelligence can safeguard your organization.
Get personalized course recommendations, track subjects and courses with reminders, and more.