Courses from 1000+ universities
Class Central experiments with cataloging online courses from California Community Colleges, offering diverse, affordable, and credit-worthy learning opportunities.
600 Free Google Certifications
Data Analysis
Digital Marketing
Ethical Hacking
Introducción a la inversión bursátil
Understanding the GDPR
Bitcoin and Cryptocurrency Technologies
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Introducing Nemesis: A revolutionary system unifying post-exploitation data for automated processing, enhancing offensive workflows, and enabling data-driven research in cybersecurity.
Inspiring talk on cybersecurity community's impact, highlighting collaborative efforts, advocacy success, and future challenges in digital risk reduction for all citizens.
Explore kernel-based attacks, including rootkit drivers and BYOVD, from a red teamer's perspective. Learn implementation techniques, defense strategies, and potential future attack vectors in kernel-level operations.
Explore MS-RPC's role in Windows, its vulnerabilities, and defensive mechanisms. Learn to utilize built-in features for tracking and defending against RPC-based attacks, with practical tools and signatures.
Explore eBPF technology: its basics, implementation challenges, and diverse applications in system observability, security, and performance optimization for developers and IT professionals.
Forensic investigation of a gaming platform theft in Ukraine, using original evidence. Insights into cybercrime, hacker tactics, and investigative techniques in hostile jurisdictions.
Exploring human-centric approaches to cybersecurity, emphasizing people skills, empathy, and communication to enhance defense strategies and organizational resilience against cyber threats.
Explore Kerberos security with custom tools, focusing on local machine vulnerabilities and privilege escalation. Gain insights into complex Kerberos artifacts for enterprise network protection.
Interactive social engineering simulation where audience makes real-time decisions to infiltrate a high-security office building, showcasing quick thinking and adaptability needed in covert operations.
Explore maritime cybersecurity vulnerabilities and learn how to hack ship systems, from steering controls to PLCs. Gain insights into industrial control systems and IoT security in the nautical world.
Insights from the frontlines of Log4J incident response: preparing for unknown vulnerabilities, leveraging threat intelligence, and aiding the community during a major cybersecurity crisis.
Explore encrypted messages in criminal cases with cryptology expert Klaus Schmeh. Discover fascinating insights into historical and modern codebreaking techniques used in crime investigations.
Explore Codecepticon, an offensive security obfuscator for C#, PowerShell, and VBA. Learn its development process, effectiveness against modern EDR and AV, and real-world applications in Red and Purple Team engagements.
Explore the intriguing story of Phineas Fisher, a notorious hacker, through their own words and manifestos. Delve into high-profile cyber incidents involving surveillance, finance, and politics.
Learn efficient threat hunting techniques in 7 steps, from basic concepts to advanced strategies. Ideal for aspiring hunters and professionals looking to enhance their cybersecurity skills.
Get personalized course recommendations, track subjects and courses with reminders, and more.