Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the psychology of phishing, analyze real-world attacks, and learn evidence-based prevention techniques. Discover how to protect against credential theft and evaluate the effectiveness of phishing training.
Explore dynamic .NET implants for red teams, focusing on flexible retooling, OpSec, and overcoming static defenses using DLRium Managed Execution toolkit.
Explore brain-computer interfaces, their current capabilities, and future implications. Delve into neurotechnology's potential, security concerns, and societal impact as we approach a cyberpunk reality.
Demystifying elliptic curve cryptography: explore its applications in HTTPS, Bitcoin, and beyond. Learn about point addition, ECDH, digital signatures, and post-quantum algorithms without deep mathematical knowledge.
Exploits in wetware: social engineering techniques, OSINT strategies, and defensive measures against human vulnerabilities in cybersecurity, based on real-world experiences.
Explore native hooking on Android emulators, understanding process start routines and emulation strategies. Learn why existing frameworks fail and how to create one that works for game cheating.
Analyze hundreds of data breach disclosures to understand common vulnerabilities, focusing on preventable issues like patching and configuration failures, and their impact on enterprises.
Explore prototype pollution attacks in NodeJS, including APIs vulnerable to pollution, potential impacts, and defensive strategies. Learn from real-world examples and security research findings.
Explore a modified OpenSSH daemon that enhances post-exploitation capabilities, bypasses network restrictions, and provides reliable interactive shell access for penetration testing and security research.
Explore Android security challenges, common attack vectors, and best practices for secure development. Learn to protect consumers from evolving mobile threats.
Explore techniques for establishing covert command and control communication using webhooks, bypassing strict network defenses and avoiding detection in penetration testing scenarios.
Innovative web scanner using intuitive techniques to detect injection vulnerabilities, offering WAF evasion, minimal network footprint, and adaptability to input filtering. Explores advanced exploitation methods and handles complex findings.
Evade antivirus and security layers with polyglot files and assembly obfuscation. Learn to create undetectable payloads for penetration testing using a versatile tool.
Explore PoS system vulnerabilities, from physical access to data extraction. Learn about kiosk breakouts, privilege escalation, and real-world examples of critical security flaws in hotel management platforms.
Explore data science tools and techniques for cybersecurity, including statistical analysis and machine learning, to enhance threat detection and defense capabilities in large-scale corporate environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.