Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover 100+ critical pre-auth vulnerabilities in Windows HTTP services like IIS, ADFS, and Hyper-V, including RCE, DoS, and info leakage exploits requiring no credentials.
Discover a novel TLB timing side-channel attack that reveals locations of security-critical Linux kernel objects, enabling enhanced kernel exploitation techniques.
Uncover novel attack methodologies targeting Windows Server Failover Clusters, exposing how single node compromise leads to complete cluster takeover and domain compromise.
Uncover the inner workings of macOS XProtect Remediator through advanced reverse engineering techniques, revealing Apple's exclusive threat intelligence and novel detection mechanisms.
Discover how Apple's AI frameworks can be exploited for offensive cybersecurity operations, including payload embedding, covert communication, and AI-assisted command and control.
Discover advanced red team networking techniques using stateless tunnels like GRE and VxLAN for initial access without phishing, plus evasion methods and VxLAN vulnerabilities.
Uncover how Unicode normalization flaws enable critical security bypasses, from WAF evasion to RCE attacks, with live demos and cutting-edge fuzzing techniques from Akamai's research team.
Uncover critical cryptographic vulnerabilities in OPC UA protocol that enable authentication bypass attacks, exploring practical exploits against industrial automation systems.
Discover network security insights from Black Hat's NOC team as they reveal statistics, tools, and techniques for securing conference networks plus humorous WiFi behavior.
Discover how checkbox security culture undermines real cyber defense and learn to refocus on addressing actual threats rather than compliance theater.
Discover the inner workings of the ransomware economy through leaked data analysis and learn what drives these criminal enterprises and potential solutions to stop them.
Explore the dark evolution from teenage hacking to serious cybercrime through the shocking Vastaamo case and learn how to break the cycle of predictable criminal progression.
Explore how Global South nations challenge Western-centric cyber attribution assumptions and develop alternative approaches to international accountability in cyberspace.
Uncover critical vulnerabilities in connection-based OAuth architectures used by AI agents and integration platforms, with practical exploits and security best practices.
Uncover the hidden privacy risks in Apple Intelligence through traffic analysis and OS inspection, revealing data flows and security concerns behind Apple's AI assistant claims.
Get personalized course recommendations, track subjects and courses with reminders, and more.