Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical tips for adapting application security to modern DevOps practices, covering static analysis, dynamic scanning, and security visibility for rapid development cycles.
Explore large-scale 3G/4G intranet scanning techniques and their application in detecting the WormHole vulnerability across millions of mobile devices in China's major ISPs.
Learn best practices for building a robust document analysis pipeline to detect malicious content, covering file type detection, sandboxing, content inspection, and evasion techniques used by attackers.
Explore advancements in targeted attacks and lateral movement techniques, examining their impact on cybersecurity and potential parallels to the Industrial Revolution.
Discover how VMware's API can be exploited to escalate insider threats, bypassing security measures that separate infrastructure and guest machine domains in enterprise environments.
Explore Android's attack surface reduction strategies, their impact on security, and future improvements. Gain insights into technical approaches and specific bug mitigation in this comprehensive overview.
Exploring challenges in cyberspace governance, including insufficient awareness among communities, international security dialogues, and the struggle to address war and peace issues in the digital realm.
Explore how malicious Chrome extensions can create botnets, distribute themselves, and exploit vulnerabilities. Learn about attack patterns, extension capabilities, and security measures.
Discover the dangers of BlueBorne, a new airborne attack method that can remotely compromise Linux and IoT devices. Learn about zero-day exploits, their impact, and how to protect against these threats.
Explore advanced techniques for evading and disabling Windows Defender ATP, including post-breach tools and behavior analytics. Gain insights into Red Team strategies for bypassing enterprise security measures.
Explore zero-day vulnerabilities and exploits through rare data analysis, revealing insights on their lifecycle, development, and implications for cybersecurity and policy.
Discover how key reinstallation attacks exploit WPA2 vulnerabilities, compromising network security. Learn about attack techniques, impacts, and countermeasures for better protection.
Explore security approaches from trusting everything to distrusting nearly all components. Learn about innovative techniques for system protection and data leak prevention.
Explore the evolving landscape of international cyber diplomacy, focusing on efforts to counter threats, promote norms, and address challenges in cyberspace from a policy perspective.
Explore hardware vulnerabilities in AES-encrypted USB devices through an audit of multiple keys and hard drives, revealing if they truly secure data as claimed.
Get personalized course recommendations, track subjects and courses with reminders, and more.