Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore AI safety, ethical considerations, and potential risks in bot development. Learn strategies for creating more secure and responsible AI systems.
Explore Active Directory vulnerabilities, attack techniques, and mitigation strategies in this comprehensive cybersecurity talk. Learn about reconnaissance, NTLM, Kerberos, and privilege escalation methods.
Explore user behavior on phishing sites through mouse and keyboard data analysis. Gain insights into decision-making patterns and learn effective strategies for enhancing cybersecurity awareness.
Discover strategies to fund your passion projects and reshape your career path. Learn about innovative funding sources and community networks to support your professional goals.
Explore cloud security essentials, from shared responsibility to logging, compliance, and incident response. Learn best practices for AWS, Azure, and Office 365 environments.
Explore the potential impact of deepfakes on market manipulation, examining traditional and new techniques, legal implications, and real-world examples. Learn about solutions to combat this emerging threat.
Explore DNS rebinding attacks, prevention techniques, and the concept of origin singularity. Learn about query analysis, protection bypasses, and practical defense strategies against this web security threat.
Explore SSO vulnerabilities, focusing on JWT and SAML tokens. Learn attack vectors, signature verification issues, and real-world implications for frameworks like WCF and SharePoint.
Explore DES-based cipher suite support in TLS, analyzing prevalence, geographical distribution, and implications for security. Learn why DES persists and how to remove it.
Explore innovative OSINT techniques to uncover phone numbers from email addresses, enhancing privacy and security investigations with cutting-edge methodologies and tools.
Explore modern document exploit kits, their infection chains, and techniques. Gain insights into ThreadKit, VenomKit, and various exploitation methods used in malicious documents.
Explore serverless architecture vulnerabilities and learn how malware can exploit AWS Lambda functions, with insights on prevention and security best practices.
Explore advanced kernel exploit techniques using page table manipulations to bypass Windows 10 mitigations. Learn virtualization-based security and memory management concepts.
Practical strategies for personal disaster recovery planning, covering digital security, backups, financial preparedness, and ensuring loved ones can manage your affairs in emergencies.
Explore adversarial machine learning's current landscape, including attack types, vulnerabilities, and defense strategies. Gain insights into visual understanding and notable research in this critical field.
Get personalized course recommendations, track subjects and courses with reminders, and more.