Courses from 1000+ universities
Class Central experiments with cataloging online courses from California Community Colleges, offering diverse, affordable, and credit-worthy learning opportunities.
600 Free Google Certifications
Data Analysis
Digital Marketing
Ethical Hacking
Introducción a la inversión bursátil
Understanding the GDPR
Bitcoin and Cryptocurrency Technologies
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Explore the complexities of global cyber norms, challenges in consensus-building, and potential risks in outsourcing digital governance frameworks.
Explore risk management in security, challenging misconceptions and revealing its value. Learn to interpret, measure, and leverage risk effectively for better organizational outcomes.
Explore big data analysis for cybersecurity using Hadoop, tackling malware, network traffic, and log files at scale to overcome processing limitations and enhance threat detection.
Explore innovative approaches to security awareness training, focusing on social engineering techniques to create positive change and effective communication strategies for lasting impact.
Aprenda a evitar erros comuns na resposta a incidentes de segurança cibernética, com foco em preservação de evidências, análise de dados e estratégias eficazes de contenção.
Explore ARM exploitation, reverse engineering, and vulnerability analysis through the lens of hacking an internet-enabled rabbit toy, uncovering authentication bypasses and remote code execution bugs.
Explore bug bounty dynamics, structure, and benefits for both hunters and companies. Learn strategies for successful programs and navigating challenges in this evolving cybersecurity landscape.
Learn to transform your phone into a low-cost IMSI catcher detector. Explore mobile security vulnerabilities, silent SMS detection, and IMSI catcher identification techniques in this comprehensive tutorial.
Dive deep into Meterpreter's inner workings, exploring its lifecycle, Reflective DLL Injection, and migration techniques. Gain technical insights into this powerful Metasploit payload for Windows systems.
Explore creative problem-solving and repurposing through the lens of building a bionic hand from a coffee maker. Learn innovative approaches to finding potential in everyday objects.
Novel USB attacks for remote control of air-gapped machines with minimal forensic footprint. Explores stealthy bi-directional channels, remote connectivity, and offloading complexity to hardware. Releases open-source toolset using freely available hardwa…
Explore the ongoing battle between Tor and censorship efforts, examining key developments and challenges in online privacy and freedom of information.
Explore cutting-edge cybersecurity insights with Thomas Mackenzie and Michele Orru as they delve into advanced techniques and strategies for protecting digital assets and networks.
Provocative talk challenging conventional InfoSec practices, offering fresh perspectives on internet security and advocating for innovative approaches to protect digital assets effectively.
Get personalized course recommendations, track subjects and courses with reminders, and more.