Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into advanced LDAP security with comprehensive exploration of obfuscation techniques, detection frameworks, and defensive strategies for protecting directory services data.
Discover how to exploit vulnerabilities in EV chargers through Bluetooth connections, exploring firmware extraction, binary exploitation, and critical IoT security lessons from Pwn2Own Automotive.
Dive into systemic weaknesses in computer boot security, exploring vulnerability detection, response challenges, and Microsoft's protective measures for UEFI Secure Boot environments.
Delve into advanced security vulnerabilities in Sonos devices, exploring kernel exploitation techniques, Wi-Fi driver weaknesses, and methods for compromising secure boot processes across multiple device models.
Discover powerful web timing attack techniques for uncovering server secrets, hidden vulnerabilities, and misconfigurations using practical tools and real-world case studies from PortSwigger's research.
Discover strategies to identify and mitigate supply chain risks in complex software ecosystems, focusing on backdoor detection and vulnerability prevention to protect your environment.
Uncover how a sophisticated fraud ring created fake stock trading programs to steal money, and learn how investigators tracked them down, leading to the arrest of 32 individuals who made â‚©9 billion illegally.
Explore key vulnerabilities in autonomous AI agent systems, including adversarial attacks and prompt injections, while gaining actionable insights on building robust defenses to protect AI deployments against evolving threats.
Discover insights from Frédérick Douzet, Professor of Geopolitics and director of GEODE, as she shares her expertise on cyberstrategy, national security, and the geopolitics of the datasphere.
Discover a novel approach to mitigate Trojan backdoors in Large Language Models through targeted neuron noising, effectively neutralizing malicious modifications while preserving model functionality.
Discover how deep learning attribution methods can reverse engineer fault injection attacks on secure embedded systems, demonstrated through bypassing EEPROM security protections.
Uncover Earth Ammit's sophisticated supply-chain attacks targeting drone manufacturers, analyzing TIDRONE and VENOM campaigns with multi-stage intrusion strategies and evolving TTPs.
Uncover critical vulnerabilities in Apple's Mobile Device Management systems through reverse engineering, security bypass techniques, and exploitation of enterprise misconfigurations.
Discover how the National Cyber Director's Office tackles complex cybersecurity challenges, coordinates federal efforts, and works with public and private partners to protect national digital infrastructure.
Explore how international cybersecurity leaders address election security challenges in 2024's record-breaking global election year, discussing cyber threats, foreign influence, and AI impacts on democratic processes.
Get personalized course recommendations, track subjects and courses with reminders, and more.