Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover strategies for gaining and showcasing penetration testing experience, overcoming imposter syndrome, and navigating HR in the cybersecurity field.
Explore Chinese APTs' tactics in software supply chain attacks, examining notable incidents, code breakdowns, and open-source vulnerabilities to understand and mitigate these sophisticated threats.
Learn strategies to effectively communicate cybersecurity risks and initiatives to executives, enabling better decision-making and business alignment in the digital age.
Explore logic-based vulnerabilities in major platforms, focusing on duplicates and business logic flaws. Learn techniques to identify and exploit these weaknesses through real-world case studies.
Explore effective communication strategies in cybersecurity, addressing business impacts, vulnerabilities, and solutions for various threats including phishing, insider risks, and ransomware attacks.
Explore reverse engineering fundamentals, tools, and strategies for information security. Learn legal aspects, safe practices, and real-world applications through war stories and CTF challenges.
Explore a serverless SIEM for efficient threat detection, covering log ingestion, analysis, notifications, and automations in cloud-native environments.
Explore Ghost DMA attacks, their mechanisms, and mitigations. Learn about the SeDeFuS conundrum and its implications for system security in this technical presentation.
Explore latest threats to mission-critical SAP applications, including cloud vulnerabilities, attack lifecycles, and remediation strategies. Gain insights from research labs and real-world examples.
Honest discussion on mental health in cybersecurity, exploring challenges, personal experiences, and effective self-care strategies for professionals in the field.
Explore the future of vulnerability advisories with CSAF, VEX, and SBOM. Learn about critical system security, risk assessment, and automation in the evolving landscape of cybersecurity.
Explore deception strategies against automated adversaries, focusing on finite state machines, multiple plans, and automated planners. Learn test setups, results, and future implications.
Explore search engine deoptimization techniques used by Gootloader malware, including compromised WordPress sites, malicious SEO, and process hollowing. Learn about server infrastructure and potential countermeasures.
Discover how a security expert exploited vulnerabilities in a Norwegian bank's systems using only pen and paper, revealing critical flaws in identity verification and account access processes.
Explore innovative approaches to cybersecurity training through gamification of tabletop exercises, enhancing engagement and effectiveness in scenario-based learning.
Get personalized course recommendations, track subjects and courses with reminders, and more.