Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover lightweight, LLM-free techniques for contextualizing IoT alerts and building causality sequences to identify root causes and attack flows in resource-constrained environments.
Discover critical vulnerabilities in SecuRam safe locks used by Liberty Safe and major retailers, revealing how UL-certified electronic locks can be cracked in seconds using a Raspberry Pi.
Uncover how attackers exploit Gemini agents through calendar invites, demonstrating 15 hijacking techniques that enable toxic content generation, device control, and data exfiltration.
Discover how abandoned AWS S3 buckets could enable massive supply-chain attacks affecting thousands of organizations worldwide and learn prevention strategies.
Discover advanced Red Team techniques for bypassing EDR solutions through physical memory access and achieving kernel-mode execution with stealthy persistence methods.
Discover OSINT techniques to assess your digital footprint and learn obfuscation methods to enhance privacy and reduce your online exposure in this hands-on workshop.
Uncover vulnerabilities in cryptographic random number generators and explore how adversaries subtly embed flaws into security standards through real CVE discoveries.
Discover how healthcare systems must prepare for quantum computing threats by transitioning to post-quantum cryptography, featuring real-world examples from Siemens Healthineers.
Discover how attackers extract sensitive PII and SSNs from AI systems through model inversion and embedding attacks, exposing privacy risks in LLMs and RAG workflows.
Uncover critical security flaws in modern 4G/5G routers through firmware reverse-engineering, demonstrating RCE exploits, SMS attacks, and network compromise techniques.
Uncover critical vulnerabilities in passkey authentication systems and learn how attackers can exploit WebAuthn API calls to forge registration and authentication responses.
Discover how to exploit RPC vulnerabilities to create devastating DoS attacks against Windows domain controllers and launch DDoS botnets using public DCs in this security research presentation.
Discover how NVIDIA secured its proprietary RISC-V ecosystem at billion-core scale with custom hardware/software architecture, novel ISA extensions, and future-proofing strategies.
Discover how to build an open source quantum sensor using off-the-shelf parts and nitrogen-vacancy diamond to measure magnetic fields with light and explore hacking applications.
Discover why adopting an adversarial mindset is essential for modern cybersecurity, covering red teaming, threat emulation, and defensive strategies against evolving attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.