Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack in Paris. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore quantum technology's impact on cybersecurity, including risks to cryptography and strategies for preparedness. Learn about quantum computing, QKD, post-quantum cryptography, and potential security benefits.
Explore a journey from CRLF injection to discovering Chrome vulnerabilities and a new XSS-like technique called Frontjacking, bypassing existing web security defenses.
Explore common security pitfalls in React applications and learn practical strategies to prevent XSS vulnerabilities, insecure API usage, and other real-world hacking risks.
Discover a critical 25-year-old vulnerability in Rsync enabling code execution and silent lateral network movement. Learn about its discovery, impact, and weaponization from PRODAFT researchers.
Automated memory analysis tool for efficient malware detection and artifact extraction, featuring visual representation, data cross-referencing, and System Manifest for rapid context reloading.
Discover top 10 remote work security mistakes, hacker perspectives, and effective solutions. Learn to protect corporate infrastructure from cyber threats in this insightful presentation by cybersecurity expert Paula Januszkiewicz.
Explore Descartes' stages of doubt to recognize psychological manipulation in cyberspace and learn effective mitigation techniques against deception in the digital realm.
Explore an extreme PIN brute force attack on EMV cards, analyzing vulnerabilities in implementation that could compromise millions of contact cards despite security measures.
Explore Active Directory forensics, lateral movement, and reconnaissance techniques. Learn to hunt for clues without AD logs using open-source tools in this hands-on session with real-world incident insights.
Explore methods to quantify network security device performance, efficacy, and risk. Learn to assess defensive appliances for better security design and network protection strategies.
Explore the emerging threat of biohackers with surgically implanted offensive security tools. Learn about this unique cybersecurity challenge and strategies to address augmented humans in your environment.
Explore offensive hunting techniques combining red and blue team approaches. Learn to leverage data from various sources during extensive red teaming operations for more effective penetration testing.
Explore advanced hacking techniques to exploit web servers, deliver malware, and evade detection. Learn ethical implications and defensive strategies against these sophisticated attacks.
Explore Windows privilege escalation techniques, focusing on token manipulation and privilege abuse to achieve SYSTEM-level access. Learn about SeImpersonate, SeAssignPrimary, and the Juicy Potato exploit.
Explore red team infrastructure management and blue team OPSEC failures. Learn about RedELK, a tool for controlling operations and detecting blue team activities during multi-month engagements.
Get personalized course recommendations, track subjects and courses with reminders, and more.