Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a data-driven methodology for prioritizing vulnerability mitigation in cybersecurity, enhancing decision-making and resource allocation for effective risk management.
Explore techniques for identifying security patches in open-source software with Dr. Kun Sun, enhancing your ability to assess and mitigate vulnerabilities effectively.
Explore innovative manufacturing security using Zero Trust, Machine Learning, and 5G in this research-driven presentation on building a smart, secure testbed for the future of industrial operations.
Explore IoT timeout behaviors in smart homes, uncovering vulnerabilities and exploitation techniques to enhance cybersecurity awareness and protection strategies.
Learn encryption techniques using CyberChef, a versatile tool for data analysis and manipulation. Explore practical applications in cybersecurity and information sciences.
Develop critical adversarial thinking skills for effective cybersecurity through innovative teaching methods and practical strategies.
Explore cyber competitions with Franz Payer from National Cyber League. Learn about challenges, benefits, and strategies for success in cybersecurity contests.
Learn practical techniques for implementing effective access controls in cybersecurity systems, enhancing your ability to protect sensitive information and manage user permissions.
Exploring the integration of cybersecurity and criminal justice to enhance public safety in the digital age, emphasizing the need for democratizing cyber security through academic excellence centers.
Explore cybersecurity insights from three distinguished professors at leading universities, discussing their research, teaching approaches, and industry perspectives.
Explore entity behavior modeling in cyberspace using agent-based techniques. Learn advanced cybersecurity concepts and applications from an expert in the field.
Explore techniques for compromising user location data in multiplayer AR games, examining vulnerabilities and potential security risks in location-based applications.
Explore in-toto, a framework for securing software supply chains, and learn its implementation strategies for enhancing cybersecurity in software development processes.
Explore classical and quantum information theoretic security with Prof. El Gamal, covering key concepts and advancements in cybersecurity and digital trust.
Learn to create secure software systems using proven security patterns, enhancing your ability to design robust and protected applications in today's cybersecurity landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.