Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how large-scale neural networks revolutionize cybersecurity, enabling custom explanations of attacker behavior and improved threat detection with limited data. Learn to leverage public models like GPT-3 for security applications.
Explore key stretching and PAKEs: their history, best practices, and applications in encrypted cloud services. Learn to create toy algorithms and understand their importance in cybersecurity.
Explore DNSSEC vulnerabilities and cryptographic agility risks, revealing how adversaries can manipulate DNS responses to compromise security and prevent DNSSEC validation.
Explore the escalating war between internet advertising fraud and anti-fraud efforts. Analyze typical underground industry gangs and their evolving tactics in this high-stakes technological confrontation.
Explore burnout in computer security, its causes, and mitigation strategies. Learn to set boundaries, manage anxiety, and maintain passion in a high-stress industry facing significant workforce shortages.
Explore Web3 and blockchain security challenges, examining the risks of emerging tech, high-stakes environments, and immutable transactions. Learn about current vulnerabilities and potential solutions.
Explore Apple's Wi-Fi kernel extensions, uncovering new vulnerabilities and attack surfaces in the ever-evolving landscape of iOS security. Gain insights into the ongoing cat-and-mouse game of bug fixes and emerging threats.
Explore ModifiedElephant's decade-long operation, incriminating activists through planted evidence. Uncover the concerning ties to commercial surveillance and multiple regional threat actors targeting victims.
Explores Intel's tunable replica circuit for detecting fault-injection attacks in processors, focusing on design, implementation, and effectiveness in preventing timing failures and unauthorized code execution.
Explore the Cyber Safety Review Board's analysis of the Log4j vulnerability, key findings, and recommendations for industry and government to enhance cybersecurity and drive systemic change.
Explore eBPF for Windows: capabilities, security model, design, and attack surface. Uncover vulnerabilities, witness fuzzing demos, and discuss exploitation challenges in Windows Protected Process.
Uncover how attackers breached an online gaming company, exploited a database backdoor, and manipulated transactions. Learn detection methods and incident response strategies for similar cyber attacks.
Análisis de vulnerabilidades en dispositivos IoT populares y desarrollo de CGuard, un nuevo marco de control de acceso para proteger a los usuarios finales de amenazas en canales de gestión.
Uncover the operations of SMS PVA services and mobile botnets, exploring device infection methods, threat actor misuse, and the implications for supply chain security in mobile ecosystems.
Innovative approach to finding bugs in scripting languages through cooperative mutation, combining script code and native input modifications to uncover hidden vulnerabilities in binding code.
Get personalized course recommendations, track subjects and courses with reminders, and more.