Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into time-based SQL injection techniques through Operation GhostShell, featuring live demos and defense strategies for protecting against sophisticated database vulnerabilities.
Uncover insights into adversarial military philosophy taught in Chinese and Russian academies through an NSA veteran's analysis of cybersecurity strategy and information warfare challenges.
Explore machine learning pipeline vulnerabilities and learn to identify, exploit, and defend against model backdoors through input handling bugs and systematic security approaches.
Discover practical IoT hacking techniques, from selecting beginner-friendly devices to building an affordable toolkit under $100. Learn common vulnerabilities and methods to gain device access using simple tools and tactics.
Discover a sophisticated EDR bypass technique combining IAT Hooking, dynamic SSN resolution, and indirect system calls to redirect Windows subsystem execution flow while remaining undetected by traditional security measures.
Discover essential digital defense strategies for travel, focusing on free tools and OPSEC principles to protect your online presence and personal data while maintaining security awareness.
Dive into a comprehensive simulation of cyberattacks on hydroelectric facilities, exploring both offensive tactics and defensive strategies through a custom-built ICS firing range environment.
Discover how to leverage LLMs for automated BOLA vulnerability detection in APIs and web applications, exploring BOLABuster's innovative approach to identifying critical security risks at scale.
Master Kubernetes security monitoring and attack simulation techniques for effective threat detection and defense in containerized environments.
Explore critical vehicle security vulnerabilities through UDSonCAN fuzzing techniques, revealing potential safety risks in diagnostic systems and their essential countermeasures for modern electric vehicles.
Uncover critical vulnerabilities in railway signaling systems through an analysis of accessible hardware tools and their potential impact on train operations, with focus on Spanish infrastructure.
Explore cybersecurity challenges and policy considerations in the rapidly expanding EV charging infrastructure, focusing on vulnerability assessment and risk mitigation strategies.
Discover powerful web cache exploitation techniques, including Static Path Deception and Cache Key Confusion, to identify and exploit URL parsing vulnerabilities across major platforms like Azure Cloud and Cloudflare.
Delve into VMware device virtualization security, exploring USB system vulnerabilities, SCSI device emulation, and VMKernel design flaws through real-world bug hunting experiences and discoveries.
Explore the fascinating Antwerp Diamond Heist to understand defense-in-depth security principles through analysis of history's greatest vault breach and its modern cybersecurity implications.
Get personalized course recommendations, track subjects and courses with reminders, and more.