Courses from 1000+ universities
The pandemic ushered in a “new normal” in online learning, but it culminated in layoffs and stock drops.
Organize and share your learning with Class Central Lists.
View our Lists Showcase
This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser…
Learn how to analyze malware, including computer viruses, trojans, and rootkits, using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools.Upon successful completion of this course, the student will be able to:…
Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco.
Industry advisors have repeatedly asked us to teach this class, because every modern business needs a web presence and there are far too few workers qualified to protect them from hackers. There are many jobs available for students who learn how to prote…
Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research,…
Covers information security in depth, including access control, application security, business continuity, cryptography, risk management, legal issues, physical security, and telecommunications and network security. This class helps to prepare students f…
Get personalized course recommendations, track subjects and courses with reminders, and more.