Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover the alarming journey of lost corporate devices in public markets through data scraping, OCR clusters, reverse engineering, and conversations with underground collectors.
Dive into advanced Android security research exploring Qualcomm Adreno GPU vulnerabilities, exploitation techniques, and kernel-level attacks to achieve root access, with practical mitigation strategies.
Explore critical vulnerabilities in medical devices and hospital networks, examining security challenges, SBOM misconceptions, and strategies for creating more secure healthcare environments.
Uncover shocking vulnerabilities in Norwegian banking systems through real-world examples of identity theft and unauthorized access, revealing critical lessons about paper-based security flaws.
Discover how to identify and exploit Bluetooth vulnerabilities in modern vehicle systems using BlueToolkit, exploring real-world security implications and practical attack vectors in automotive and aviation contexts.
Explore the practical challenges of implementing differential privacy systems, from explaining technical guarantees to non-experts to preventing misuse and integrating with existing security tools.
Dive into a real-world investigation of modem vulnerabilities, ISP security flaws, and the concerning centralization of broadband infrastructure through a personal hacking incident analysis.
Master efficient bug bounty automation techniques to enhance hunting speed, bypass limitations, and maximize earnings through strategic tools and methodologies for finding vulnerabilities first.
Discover how student researchers uncovered 9 zero-day vulnerabilities in Vilo routers through hardware hacking, firmware analysis, and cloud infrastructure investigation, highlighting IoT security challenges.
Discover efficient techniques for analyzing unknown functions in binaries, focusing on portable symbol creation and management using Ghidra, with practical examples from Golang-based malware analysis.
Explore critical security vulnerabilities in 1Password's MacOS app, including local vault exploitation, IPC weaknesses, and Chrome extension flaws that could compromise password security.
Dive into critical security vulnerabilities in GitHub Actions, exploring real-world attacks on self-hosted runners and learning how to prevent supply chain compromises in major open-source projects.
Discover how to build Fly Catcher, a Raspberry Pi-based device using neural networks to detect spoofed aircraft signals through ADS-B monitoring and analysis in real-time.
Discover how to exploit space mission vulnerabilities through ground infrastructure attacks, focusing on SPARTA techniques and man-in-the-middle exploits for spacecraft communications.
Dive into critical NTLM authentication vulnerabilities, exploring new bugs, bypass techniques, and security control gaps in Windows systems before Microsoft phases out this protocol.
Get personalized course recommendations, track subjects and courses with reminders, and more.