Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore biometric data usage, privacy legislation, and implications in APAC and globally. Learn about government and private sector practices, legal frameworks, and individual rights regarding biometric information.
Explore techniques for attacking and defending machine learning applications in public cloud environments, focusing on visual classification vulnerabilities and countermeasures.
Explore techniques for identifying vulnerabilities in embedded firmware, focusing on multi-binary analysis, dynamic and static approaches, and scalable solutions for IoT device security.
Explore advanced static binary injection techniques to insert external code into executables, modifying run-time behavior. Learn from experts about this powerful yet underutilized method.
Explore store-to-leak forwarding attacks, their evolution since Meltdown, and implications for data security in modern processors. Learn about new vulnerabilities and mitigation strategies.
Explore vulnerabilities in mobile network protocols across generations and learn about cross-protocol attacks in 5G networks, presented by security expert Sergey Puzankov.
Explore microarchitectural attacks on flawless hardware, focusing on page cache vulnerabilities. Learn about state-of-the-art techniques, countermeasures, and implications for system security.
Demonstration of exploiting URGENT/11 vulnerabilities in industrial controllers to take over an entire factory with a single packet, highlighting cybersecurity risks in automated systems.
Explore the journey of InfoSecGirls, a community empowering women in cybersecurity, from its origins in India to its global impact, fostering diversity and inclusion in the tech industry.
Explore modern binary disassembling techniques and tools, understanding their strategies, challenges, and how modern ABI enhances the process. Learn about evaluation results and new approaches in this field.
Explore techniques for capturing 0-day attack payloads automatically in public cloud environments, with real-world examples and insights on model performance and monitoring strategies.
Explore a deep learning-based method for authorship analysis to combat fake news, protecting reputations and market stability through advanced tracking techniques.
Explore instant app architecture and attack models, uncovering vulnerabilities in this popular app format. Learn about security implications and potential exploits in click-to-play designs.
Explore TrustZone-M vulnerabilities and learn about innovative solutions for enhancing security through multiple trusted environments in embedded systems.
Practical strategies for small healthcare providers to protect against cyber threats, focusing on actionable plans and cost-effective solutions to safeguard patient data and prevent ransomware attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.