Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover critical Azure API Connection vulnerabilities that enable cross-tenant attacks and secret extraction with minimal privileges through Logic Apps and Power platforms.
Uncover critical NVIDIA Container Toolkit vulnerabilities that enable container escapes and compromise AI infrastructure across major cloud platforms.
Discover how AI agents autonomously analyze digital forensic timelines and hunt threats in massive log datasets, revolutionizing incident response efficiency.
Discover how AI assistants can be exploited for enterprise compromise through 0-click attacks, prompt injection vulnerabilities, and mitigation strategies using the GenAI Attack Matrix.
Discover critical RCE vulnerabilities in HashiCorp Vault and CyberArk Conjur with live demonstrations of remote attacks on default configurations and learn detection/prevention methods.
Discover how to exploit synthesized hardware failures to bypass CPU security boundaries and achieve privilege escalation through software-only attacks.
Explore cybersecurity evolution from analog to AI era, examining global digital vulnerabilities, supply chain risks, and strategies for building resilient infrastructure systems.
Discover how to revolutionize command line security by combining anomaly detection with LLMs to reduce false positives and enhance malicious command classification accuracy.
Discover Google's FACADE AI system for detecting insider threats with 99.99% accuracy using contrastive learning and self-supervised ML on billions of daily events.
Discover critical OAuth misconfigurations in Microsoft Entra ID that enabled unauthorized access to 20+ internal Microsoft applications, exposing sensitive data and admin privileges.
Discover BEAM, an open source tool that detects supply chain attacks through web traffic analysis, achieving 95%+ accuracy without endpoint agents or code changes.
Uncover critical vulnerabilities in HTTP/2 server push and signed HTTP exchange that bypass Same-Origin Policy protections, enabling cross-site scripting and cookie manipulation attacks.
Explore inference attacks on fitness tracking social networks, revealing vulnerabilities in endpoint privacy zones and discussing implications for user privacy and location protection.
Explores a newly discovered attack surface in Java applications, focusing on JDBC vulnerabilities in cloud-native systems and customized database management services.
Explore eBPF technology for kernel-level programming, runtime code loading, and performance optimization. Learn key concepts, security implications, and practical applications in this deep dive.
Get personalized course recommendations, track subjects and courses with reminders, and more.