Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how Microsoft's Office of the CISO leverages global threat intelligence and AI to enhance security posture, with insights from Deputy CISO Ann Johnson and Threat Intelligence Director Sherrod DeGrippo.
Explore the challenges of establishing effective OT Security Operations Centers, including threat detection, IT/OT integration, governance structures, and emerging technologies for industrial cybersecurity.
Explore the stealthiness and potency of UEFI OROM backdoors through novel proof-of-concept demonstrations, evasion techniques, and defense strategies against these sophisticated firmware-level threats.
Explore the risks of transitive vulnerabilities in software dependencies, learn to quantify their impact, and discover practical mitigation strategies through real-world examples and exploit demonstrations.
Explore a rigorous methodology for evaluating LLMs' offensive cyber capabilities through prompting, simulation, and emulation on real targets, addressing gaps in current risk assessments.
Dive into a forensic analysis of the CyberAveng3rs' attack on Unitronics PLCs, exploring vulnerability research, exploit development, and incident response techniques for industrial control systems.
Explore modern disinformation tactics and foreign manipulation techniques through NATO case studies, examining AI's role, social media exploitation, and evolving strategies to undermine democratic institutions.
Explore how bit-flipping attacks on domain names can lead to credential harvesting, featuring the 'Certainly' tool for red-team engagements and essential defensive strategies against DNS exploitation.
Explore how digital transformation revolutionizes critical infrastructure, focusing on resilience, reliability, and cybersecurity in the shift from analog to virtualized systems for enhanced energy delivery.
Discover how cloud security complexity led to critical vulnerabilities in Google Cloud Platform, affecting millions of servers, and learn about the dangers of treating cloud services as black boxes.
Discover insights from organizing Hack@DAC, the world's largest hardware hacking competition, including strategies, challenges, and impacts on the security research community over seven years of hosting 1000+ researchers.
Discover the essential principles of cyber-insurance with VP R&D Tiago Henriques, exploring key concepts and applications in this specialized field.
Explore the complex intersection of ethics and cyber-insurance, examining moral hazards, industry challenges, and critical considerations for modern digital risk management.
Explore modern strategies for combating cheating, toxicity, and abuse in competitive gaming, examining both technical and social approaches to maintaining fair and enjoyable gameplay environments.
Explore the evolution of microarchitectural vulnerabilities, from pre-Meltdown/Spectre to modern processor attacks, examining defense strategies and emerging threats in GPUs and NPUs.
Get personalized course recommendations, track subjects and courses with reminders, and more.