Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover the Azazel System: a Raspberry Pi-based cyber-scapegoat that actively delays attackers using military strategy principles, perfect for home labs and CTF environments.
Discover essential LLM attack techniques for Red Team operations, covering prompt injection, jailbreaks, and real-world exploitation strategies against enterprise AI systems.
Discover how LLM-based AI agents revolutionize SOC operations by reconstructing attack timelines, prioritizing threats by business impact, and automating responses for smarter security.
Uncover vulnerabilities and secrets hidden in Google's Artifact Registry through comprehensive scanning of container images and security analysis findings.
Discover candid cybersecurity career advice from executives who share failures, growth stories, and promotion challenges using gambling metaphors for advancement strategies.
Discover how to transform compliance-driven security into strategic business partnerships through real startup examples and practical tactics for embedding security in roadmaps.
Discover how STPA-Sec methodology identifies hidden hazards in military AI systems, revealing systemic risks like misaligned recommendations and interface ambiguity to prevent dangerous failures.
Explore rising cyber threats, third-party risks, privacy regulations, and cost-effective mitigation strategies for today's complex digital landscape.
Uncover how Turla infiltrated Pakistani ISI systems targeting Indian, Syrian, and Afghan governments through advanced espionage techniques and infrastructure exploitation.
Discover iOS reverse engineering techniques to modify apps without jailbreaking, using YouTube as a case study to remove unwanted short-form content through method swizzling and debugging.
Discover Kubernetes security vulnerabilities through real interview scenarios and learn practical defense strategies against cluster attacks and disruptions.
Discover how to teach digital security and privacy to marginalized communities using storytelling frameworks and threat modeling for activists and vulnerable groups.
Discover strategies for designing cybersecurity competitions like WRCCDC and CIRCUS, including organization challenges, growth tactics, and bridging the cybersecurity skills gap.
Discover quantum computing threats to encryption and explore AI-driven anomaly detection with quantum-resistant cryptography methods for future cybersecurity challenges.
Discover how to scan for secrets at scale using Kubernetes and cloud credits on a student budget, targeting VS Code extensions and public sources effectively.
Get personalized course recommendations, track subjects and courses with reminders, and more.