Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into SSH protocol vulnerabilities and novel attacks, exploring implementation flaws and security risks through practical demonstrations with the sshamble open-source tool.
Explore network appliance security evolution, from traditional Linux-based systems to modern approaches using Docker and Golang, while examining vulnerabilities and best practices for robust firmware protection.
Discover critical security vulnerabilities in self-hosted GitHub CI/CD runners and learn defensive strategies against pipeline poisoning attacks that could compromise entire software supply chains.
Uncover critical vulnerabilities in carrier-based video calling systems that enable remote smartphone exploitation, focusing on attack surfaces and security implications for mobile communications.
Explore the organizational dynamics of the Conti ransomware group through economic and complex systems theories. Discover how chat log analysis reveals hierarchical structures, relationships, and resilience factors within this Russian cybercriminal organ…
Explore UK Defence research on Reinforcement Learning for automated cyber defense decision-making, including Multi-Agent RL approaches and deep RL with Graph Neural Networks for resilient defense against sophisticated machine-speed attacks.
Explore how constitutional law fails at threat modeling, examining legal system vulnerabilities and civil liberty implications in today's evolving political landscape.
Discover how Citizen Lab exposed global surveillance campaigns targeting journalists and activists, revealing state cyber espionage and mercenary spyware operations worldwide.
Discover CISA's operational approach to cybersecurity as national security, exploring critical infrastructure protection strategies and collaborative defense methods.
Explore advanced lateral movement techniques from Active Directory to Entra ID, bypassing authentication and MFA in hybrid environments with undocumented methods.
Discover how statistical analysis of DNS traffic enables precise device tracking and user fingerprinting across networks, plus learn defensive countermeasures.
Explore AI agent security vulnerabilities through real-world exploits and learn defensive strategies for enterprise agentic systems from NVIDIA's AI Red Team experts.
Uncover critical security vulnerabilities in PyTorch's TorchScript engine that challenge the safety of weights_only=True, revealing RCE risks in AI applications.
Discover QUACK, a framework that automatically protects applications from deserialization attacks using static duck typing to limit exploitable code gadgets by 97%.
Explore how KCFG and KCET revolutionize Windows kernel security through hypervisor-based control flow integrity, reshaping exploitation techniques and defensive strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.