Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Strategies for managing human factors during security incidents, focusing on psychological responses, effective communication, and team leadership in high-stress situations.
Explore vulnerabilities in PLCs, learn discovery methods, and see how minor flaws can lead to device takeover. Gain insights into industrial control system security and potential exploits.
Learn DIY integrated circuit decapping techniques to reveal hidden chip designs using budget-friendly methods. Explore mechanical and chemical removal processes, laser cutting, and more.
Explore hardware hacking techniques like CT scanning and chip decapping for non-destructive device analysis, circuit reconstruction, and vulnerability identification in embedded systems and access control.
Explore LD_PRELOAD process injection, its audit system, and whitelisting challenges. Learn about built-in protection vs. bolt-on solutions for Linux security.
Explore 5G protocol vulnerabilities and exploits, analyzing real traffic captures to uncover potential security issues in pre-authentication messages and discuss implications for mobile network security.
Practical insights on implementing Zero Trust security in a cloud-based, remote work environment. Covers challenges, solutions, and lessons learned from real-world experience.
Explore Kubernetes security challenges, attack techniques, and practical advice for pentesters and security practitioners in containerized environments.
Explore legal and technological aspects of protecting digital privacy during border crossings, with insights on device security and traveler rights.
Detailed examination of critical 0-day vulnerabilities in Cisco SMB switches, including web application and API exploits, leading to complete endpoint compromise and data leakage.
Practical approach to threat modeling for prioritizing defenses. Learn to identify relevant adversaries, match them to your organization, and take action to improve security posture.
Explore SHAKEN/STIR, a new tech standard using public key cryptography to combat phone number spoofing and reduce spam calls, with insights on implementation challenges and interim solutions.
Explore hardware decompilation techniques to extract high-level functionality from integrated circuit netlists, drawing parallels with software decompilation for design recovery and hardware assurance.
Explore Project Everest's verified, high-performance secure communication components. Learn about F* programming, EverCrypt, EverParse, and EverQuic-transport, and their adoption in major projects.
Explore email address reputation analysis for identifying spear-phishing and fraud. Learn about EmailRep, a system using OSINT techniques to assess email risk and differentiate real users from attackers.
Get personalized course recommendations, track subjects and courses with reminders, and more.