Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how the ReVault attack compromises secure SoC chips in 100+ laptop models, enabling low-privilege users to extract secrets and gain persistent firmware access.
Discover advanced AI vulnerability hunting techniques including adversarial prompts, injection attacks, and RAG manipulation to maximize bug bounty earnings and impact.
Discover mainframe penetration testing through z/OS Unix System Services, exploring privilege escalation, database compromises, and buffer overflow attacks with live demos.
Discover how to exploit synthesized hardware failures to achieve privilege escalation, bypassing traditional safeguards and revealing new attack vectors across system architectures.
Uncover China's persistent 5-year campaign targeting enterprise firewalls with custom exploits and bespoke malware, plus industry countermeasures and collaborative defense strategies.
Uncover the unfiltered reality of darknet markets through a veteran's 10-year journey, revealing scam evolution, infrastructure secrets, and the psychological warfare behind market collapses.
Discover DARPA's AI Cyber Challenge winners and their revolutionary AI-driven cybersecurity solutions that automatically find and fix software vulnerabilities in critical systems.
Uncover how nation-state hackers exploit human vulnerabilities and system weaknesses through real-world case studies of attacks on critical infrastructure and industrial systems.
Discover the world's first Malware Museum and learn how digital artifacts like computer viruses preserve underground hacking culture and early digital aesthetics through modern emulation.
Discover real-world mistakes and effective techniques for covert entry assessments, debunking Hollywood myths while learning physical surveys, social engineering, and troubleshooting.
Uncover critical vulnerabilities in goTenna Pro encrypted radios where single RF packets can overwrite encryption keys, enabling man-in-the-middle attacks and network manipulation.
Discover the complete process of designing and creating electronic conference badges, from concept to production, with insights from a seasoned hardware security engineer.
Discover how industry leaders from Amazon, PayPal, AWS, Shopify, and Splunk manage large-scale bug bounty programs, covering triage, researcher relations, and scaling strategies.
Explore anti-cheat systems and learn innovative ways to trigger game bans without actual cheating, plus hardware ID spoofing and remote machine poisoning techniques.
Uncover critical vulnerabilities in bare metal cloud environments through real-world attack demonstrations, firmware exploits, and multi-tenant compromise techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.