Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Communication Skills
Software Development
Digital Marketing
How to Write Your First Song
Bioseguridad y equipo de protección para la prevención de COVID-19
Let's Get Started: Building Self-Awareness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore load balancer architecture, deployment, and post-breach access. Learn to navigate systems, avoid detection, and exploit configurations across various platforms for enhanced network control.
Explore RDP security risks, attacks, and mitigation strategies. Learn to deploy secure RDP servers and detect potential threats in Windows remote environments.
Explore authentication challenges in SaaS integration and cloud transformation, focusing on security pitfalls, unmanaged cloud identities, and the importance of cloud-based Identity Provider solutions.
Explore the process of designing, developing, and launching an open-source CAN bus tool. Learn about PCB design, driver development, and the challenges of bringing hardware products to market.
Unmasking cybercriminals' sophisticated techniques for account takeover attacks, focusing on machine fingerprint markets, their impact on Canadians, and strategies for protection against this growing threat.
Explore advanced device profiling bypass techniques using DHCP packet manipulation for Network Access Control systems. Learn about implementation, mechanics, and risk mitigation strategies.
Exploring coordinated vulnerability disclosure in Canada's federal government, highlighting gaps and recommending policy frameworks to enhance cybersecurity and protect security researchers.
Explore critical vulnerabilities in network equipment, from routers to firewalls. Learn about common patterns, historical context, and future trends in cybersecurity for these essential devices.
Explore AMITT framework updates for combating disinformation, including new countermeasures. Learn about recent events and practical applications in influence operations defense.
Analyse de l'utilisation malveillante des médias sociaux pendant l'élection fédérale canadienne de 2019, examinant le rôle des bots sociaux dans la manipulation du discours politique et la désinformation.
Exploring the tension between privacy and monopoly in tech, advocating for interoperability as a solution to enhance security without compromising user rights or enabling corporate dominance.
Explore GraphQL security: attack vectors, defense strategies, and hands-on learning with the Damn Vulnerable GraphQL Application. Gain insights into protecting this emerging API technology.
Explore 'repo jacking', a widespread supply chain vulnerability affecting 70,000+ open-source projects. Learn its causes, exploitation methods, and mitigation strategies to protect your GitHub-dependent projects.
Explore cryptographic best practices, common pitfalls, and secure implementations for random number generation, encryption, hashing, and more. Essential knowledge for designing and auditing cryptographic systems.
Explore imposter syndrome, self-doubt, and personal growth in tech. Learn to embrace uniqueness and overcome negative self-perceptions in this empowering talk.
Get personalized course recommendations, track subjects and courses with reminders, and more.