Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how additional features in contactless payment systems create security vulnerabilities and learn practical solutions to protect against these threats.
Uncover how Microsoft's MapUrlToZone API vulnerabilities allowed attackers to bypass Windows security by disguising remote files as local, leading to a dozen CVEs fixed in 2025.
Discover how Nix and NixOS revolutionize software deployment, eliminate vendor lock-in, and enable secure self-hosting of 120,000 Linux packages for ultimate control.
Explore UEFI bootkits and kernel rootkits construction, examining modular design, boot chain hooking, and advanced stealth capabilities with a complete framework for testing defenses.
Uncover how crypto scammers operate through real case analysis, fund tracking, and learn essential defense strategies to protect yourself from sophisticated financial fraud schemes.
Uncover critical FIDO2 vulnerabilities through CTRAPS attacks that exploit CTAP protocol weaknesses, enabling credential wiping, unauthorized resets, and user tracking on popular authenticators.
Discover fundamental game hacking concepts and security principles in video games through practical examples and hands-on techniques.
Explore keyboard hacking techniques from keyloggers to Van Eck phreaking, RF attacks, and acoustic eavesdropping to capture plaintext before encryption in this live tutorial.
Uncover macOS PRT cookie extraction techniques and Entra ID persistence methods, comparing Windows/macOS security controls and demonstrating novel device registration attacks.
Discover how to weaponize open-source tools against $75B pig butchering scams and fight transnational crime syndicates exploiting trafficking victims through military-grade psychological ops.
Discover how bloatware vulnerabilities led to 7 CVEs in 7 days, exposing privileged service flaws that enable browser-to-system exploitation across major vendors.
Explore the evolution of SSH honeypots from DEF CON 24's puzzle to advanced Cowrie-based challenges featuring custom commands, adventure games, and innovative terminal interactions.
Uncover how threat actors exploit npm's 5 million packages to deliver malware and why traditional security tools like SCA, SAST, and EDR fail to detect these npm-based attacks.
Uncover the sophisticated supply chain attack behind the tj-actions incident, revealing how attackers weaponized open-source trust to target Coinbase through lateral movement.
Discover how to build a self-evolving firewall using TLS/HTTP fingerprints and AI to block bots and create dynamic deception traps that adapt in real-time.
Get personalized course recommendations, track subjects and courses with reminders, and more.