Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore HTTP Adaptive Streaming vulnerabilities in Chrome, focusing on YouTube's DASH implementation and potential privacy risks through traffic analysis and machine learning techniques.
Explore advanced techniques for detecting and analyzing malware using machine learning, big data, and network analysis to stay ahead of evolving cyber threats.
Streamline incident response with automation, reducing reliance on specialized skills. Learn to build an investigation engine, leverage ontologies, and enhance operational efficiency.
Explore techniques to manipulate analog-to-digital converters, focusing on signal processing methods to deceive industrial control systems and embedded devices. Learn potential vulnerabilities and their implications.
Explore patterns of cyber criminal activity in underground forums, analyzing behavior across clear, deep, and dark web platforms to understand hacker communities and their focus areas.
Explore vulnerabilities in Android chipsets, focusing on Qualcomm's role in mobile security. Learn about recent issues and Google's responses to tighten Android's fragmented ecosystem.
Explore the design of undetectable rootkits for Programmable Logic Controllers, uncovering vulnerabilities and potential threats to industrial control systems.
Explore the rise of ransomware as a disruptive force in cybersecurity, examining its unique characteristics, profit motives, and impact on the evolving landscape of digital threats.
Discover practical attacks on SSL VPNs, compromising corporate networks. Learn out-of-the-box security techniques, immediate mitigation strategies, and the vulnerabilities of Virtual Private Networks.
Explore techniques used by malware authors to prevent reverse engineering of Android native libraries, and learn strategies to overcome these anti-analysis traps.
Explore containerization's impact on offensive security operations, focusing on Docker's implications for penetration testing and application security in multi-container environments.
Uncover critical security vulnerabilities in trading technologies, including unencrypted data, DoS risks, and weak authentication. Learn about responsible disclosure and recommendations for safer trading practices.
Uncover hidden hardware backdoors in x86 CPUs, exploring their depth and implications. Learn about the feasibility of widespread hardware vulnerabilities and their potential impact on processor security.
Explore macOS firewall creation and vulnerabilities, covering kernel-level socket filtering, user-mode communication, secure installation, and self-defense mechanisms. Learn about firewall bypasses and potential weaknesses.
Strategies for community response to sexual harassment/assault incidents, focusing on survivor support, accountability, and bystander intervention. Explores leadership roles and community healing.
Get personalized course recommendations, track subjects and courses with reminders, and more.