Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore IoT certification, labeling, and security standards with insights on UK practices, legislation, and future developments in the field.
Learn to intentionally create website vulnerabilities for security awareness and testing, enhancing your understanding of web application security risks and defenses.
Explore strategies to minimize false alerts in security systems through policy layers, whitelisting, and generalized abilities for more efficient threat detection.
Explore diverse cybersecurity career paths, uncover your passion, and learn strategies for professional growth in this insightful talk by industry expert Cherie Burgett.
Explore Android's security enhancements, focusing on Project Treble's impact. Analyze SELinux, Stagefright, and MediaDrmServer vulnerabilities to understand where improvements succeed or fall short.
Optimize end user engagement through courtesy, clarity, and comprehension. Learn effective strategies to enhance communication and interaction in professional settings.
Learn to start and run an "I Club" for sharing knowledge and skills in computer security, with practical tips on logistics, advertising, and community building.
Learn to start and run an "I Club" for cybersecurity enthusiasts, fostering community learning and skill development through shared experiences and competitions.
Explore vulnerabilities in Building Management Systems and their potential impact on safety and security. Learn about risks, attack vectors, and mitigation strategies in this eye-opening presentation.
Explore SniffAir, an open-source framework for wireless security assessments. Learn its functionality, features, and applications in enhancing network security through practical demonstrations and expert insights.
Explore security challenges at Standing Rock, including IMSI catchers and surveillance. Learn about indigenous-led movements, cyber warfare, and human rights in the context of media blackouts.
Explore techniques for creating unbiased datasets in machine learning, focusing on common pitfalls and strategies to mitigate selection, capture, negative set, and category biases.
Explore system dynamics for modeling cyber network operations, focusing on Operation Aurora and phishing. Learn about policy management, capabilities, and feedback loops in cybersecurity.
Discover techniques to efficiently gather numerous Facebook accounts daily using advanced internet search strategies for research or security testing purposes.
Explore cross-platform Metasploit payloads for enhanced penetration testing capabilities. Learn techniques to create versatile and effective payloads across multiple operating systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.