Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the future of cybersecurity, its impact on society, and the evolving role of hackers in shaping our digital landscape with insights from security researcher Keren Elazari.
Explore innovative strategies for engaging and educating the next generation of cybersecurity professionals, focusing on effective teaching methods and bridging the skills gap.
Explore a LangSec-inspired programming language designed to enhance security and reduce vulnerabilities in software development through innovative syntax and design principles.
Explore "I Am The Cavalry" initiative, focusing on cybersecurity challenges in critical systems and the importance of public safety collaboration.
Explore vulnerability disclosure practices, challenges, and solutions in cybersecurity. Learn how researchers and vendors can collaborate effectively to improve software security and reduce friction.
Learn techniques for live digital forensics, including memory acquisition, disk analysis, and artifact collection. Explore free tools and best practices for gathering crucial system information.
Explore the Angler exploit kit, domain shadowing, and cybersecurity threats. Learn detection methods and gain insights into evolving attack techniques and defense strategies.
Explore advanced PowerShell techniques for red teaming, including Empire framework, malware motivations, and offensive strategies. Learn about extensibility, staging, and detection methods.
Learn to leverage Docker for efficient and flexible penetration testing environments, covering architecture, image building, port forwarding, and integrating essential security tools.
Explore adversary intelligence methodologies, from conflict to consensus, focusing on ground truth analysis, diamond models, and evolving risk perceptions in cybersecurity.
Explore innovative ways to repurpose and reuse technology, focusing on Android devices and Linux installations on various platforms. Learn about security implications and future possibilities.
Explore the differences between central and local verification of memorized secrets, examining security implications and best practices for password management.
Explore why young people disregard password security advice and learn effective strategies to engage them in cybersecurity best practices.
Explore the unique challenges and experiences of relocating to Point Roberts, an American exclave bordering Canada, in this intriguing talk by Robert "TProphet" Walker.
Discover why shorter passwords can be more secure and effective. Learn innovative approaches to password management and authentication in this thought-provoking talk.
Get personalized course recommendations, track subjects and courses with reminders, and more.