Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to investigate and respond to attacks on GenAI chatbots, including prompt injection incidents, using AI defense tooling and LLM guardrails for effective incident response.
Discover advanced techniques for mining Java deserialization vulnerabilities using bottom-up gadget search and dataflow-aided payload construction to identify zero-day exploits.
Discover how APT groups exploit Windows Sandbox for evasion, analyzing Earth Kasha's tactics and learning defensive countermeasures for threat hunting.
Explore Singapore's evolving cyber threat landscape as AI reshapes attack vectors while traditional threats like ransomware and APTs persist in this insightful keynote.
Explore how Indonesia's Muslim Cyber Army pioneered weaponized deception tactics in cyberspace, featuring behavioral analysis and ethnographic insights from Islamic communities.
Uncover the shadowy world of hardware supply chains and learn practical approaches to establishing trust in global manufacturing networks from industry expert bunnie Huang.
Discover critical security vulnerabilities in WeChat's proprietary MMTLS encryption protocol through comprehensive analysis by Citizen Lab researchers.
Uncover sophisticated voice phishing tactics using malicious apps disguised as financial and vaccine applications, analyzing attack infrastructure and recent cybercrime trends.
Discover how attackers can bypass macOS location privacy controls to track users without consent through database vulnerabilities and third-party app exploits.
Discover how to exploit CVE-2024-38077, a critical preauth RCE vulnerability affecting Windows Server 2003-2025, bypassing modern security mitigations for 0-click remote code execution.
Uncover Qualcomm's QDSP6 JTAG mysteries through advanced theoretical reverse engineering techniques using patent analysis, firmware reverse engineering, and theoretical modeling.
Discover how to reverse-engineer HID SEOS RFID protocol through the first open source implementation, revealing security insights for access control systems used in corporate environments.
Discover how Byzantine RPKI (ByzRP) creates a robust, distributed shield against routing security attacks, bypassing RPKI vulnerabilities with zero downtime for global network protection.
Unveiling critical vulnerabilities in SAP enterprise software through analysis of the "P4" protocol, demonstrating tactics and techniques for remote and root access exploitation in mission-critical business systems.
Uncover vulnerabilities in Zoom's Zero Touch Provisioning for desk phones, exploring potential remote attacks and security implications in cloud communication platforms.
Get personalized course recommendations, track subjects and courses with reminders, and more.