Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Computer Science
Web Development
Digital Marketing
Greek and Roman Mythology
Improving Your Study Techniques
Understanding the GDPR
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore how library science principles can enhance information security practices, improving data organization, retrieval, and overall cybersecurity effectiveness.
Explore the evolution of hacking and un-hacking a logic game over two decades, culminating in insights about the popular puzzle Lights Out.
Explore Proving Ground, a powerful OSINT tool, and learn its methodology, benchmarks, and limitations compared to other tools in this comprehensive overview.
Explore techniques for bypassing security measures and penetrating systems, focusing on practical strategies and real-world applications in cybersecurity.
Discover advanced OSINT techniques for social media intelligence gathering, focusing on efficient methods to extract valuable information from online platforms.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore techniques for backdooring MS Office documents using secret master keys, uncovering potential vulnerabilities and security risks in widely-used productivity software.
Explore security vulnerabilities, consumer protection laws, and IoT's impact on legal frameworks. Gain insights into evolving cybersecurity challenges and their legal implications.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Explore vulnerabilities in medical devices and healthcare systems, revealing potential risks to patient safety through a three-year research project on direct attack vectors.
Explores the challenges of securing inter-service communication in micro-service architectures, highlighting potential vulnerabilities and system failures due to poor certificate implementation practices.
Explore efficient AWS IAM federation with directory services, focusing on CLI tools for Linux developers. Learn innovative solutions beyond expensive web consoles.
Explore essential roles, responsibilities, and legal requirements for running non-profit organizations, with insights applicable to for-profit corporations and event management.
Get personalized course recommendations, track subjects and courses with reminders, and more.