Courses from 1000+ universities
Scaler Academy projected $200M in revenue but delivered only a fraction. Class Central’s exclusive analysis reveals another major EdTech deception in India
600 Free Google Certifications
Web Development
Project Management
Graphic Design
Gender and Sexuality: Applications in Society
Learning How To Learn for Youth
English in Early Childhood: Language Learning and Development
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore eBPF technology: its basics, implementation challenges, and diverse applications in system observability, security, and performance optimization for developers and IT professionals.
Forensic investigation of a gaming platform theft in Ukraine, using original evidence. Insights into cybercrime, hacker tactics, and investigative techniques in hostile jurisdictions.
Exploring human-centric approaches to cybersecurity, emphasizing people skills, empathy, and communication to enhance defense strategies and organizational resilience against cyber threats.
Explore Kerberos security with custom tools, focusing on local machine vulnerabilities and privilege escalation. Gain insights into complex Kerberos artifacts for enterprise network protection.
Interactive social engineering simulation where audience makes real-time decisions to infiltrate a high-security office building, showcasing quick thinking and adaptability needed in covert operations.
Explore maritime cybersecurity vulnerabilities and learn how to hack ship systems, from steering controls to PLCs. Gain insights into industrial control systems and IoT security in the nautical world.
Insights from the frontlines of Log4J incident response: preparing for unknown vulnerabilities, leveraging threat intelligence, and aiding the community during a major cybersecurity crisis.
Explore encrypted messages in criminal cases with cryptology expert Klaus Schmeh. Discover fascinating insights into historical and modern codebreaking techniques used in crime investigations.
Explore Codecepticon, an offensive security obfuscator for C#, PowerShell, and VBA. Learn its development process, effectiveness against modern EDR and AV, and real-world applications in Red and Purple Team engagements.
Explore the intriguing story of Phineas Fisher, a notorious hacker, through their own words and manifestos. Delve into high-profile cyber incidents involving surveillance, finance, and politics.
Learn efficient threat hunting techniques in 7 steps, from basic concepts to advanced strategies. Ideal for aspiring hunters and professionals looking to enhance their cybersecurity skills.
Explore software supply chain vulnerabilities, focusing on SaaS security. Learn about access control, API restrictions, maturity evaluation, logging, cloud security, and code integrity.
Explore aviation security vulnerabilities through pen testing research, covering access risks, performance calculations, maintenance mode issues, and potential misunderstandings in the industry.
Explore effective third-party risk assessment beyond checklists. Learn to ask insightful questions that reveal an organization's commitment to security and trustworthiness in the software supply chain.
Explore common authentication pitfalls, costs, and phases. Learn about 2FA misconceptions, password security, and new guidelines for robust authentication practices in the digital age.
Get personalized course recommendations, track subjects and courses with reminders, and more.