Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover critical zero-day vulnerabilities in Apple's trusted features like Siri, Spotlight, and Safari that bypass Face ID locks and expose sensitive data on fully updated iPhones.
Explore advanced Active Directory exploitation through Group Policy Objects, turning enterprise infrastructure into command-and-control systems for sophisticated attacks.
Discover how to secure autonomous AI systems and multi-agent workflows through threat modeling, supply-chain defenses, and red-team strategies for emerging agentic architectures.
Discover real-world challenges of operating Tor's global anonymity network through firsthand stories from core developer Roger Dingledine at DEF CON 33.
Explore hidden Linux systems in webcams, uncovering supply chain vulnerabilities, firmware security flaws, and the surprising autonomy of seemingly simple devices.
Discover physical security bypass techniques including egress hardware exploitation, access control vulnerabilities, and door entry methods beyond lock picking.
Uncover the Signalgate scandal: Trump officials' OPSEC failures, fake Signal app vulnerabilities, TeleMessage hacks, and analysis of leaked chat data from government communications.
Explore quantum computing's threat to current encryption, timeline predictions, and detection strategies for cryptographically relevant quantum attacks on RSA and ECC systems.
Uncover IoT vape detector vulnerabilities through hardware teardown, firmware analysis, and reverse-engineering to expose surveillance tech flaws in educational environments.
Explore expanded vulnerabilities in Saflok hotel locks, covering handheld programmers, lock interfaces, credential bit fields, and why security-through-obscurity fails in practice.
Discover how to exploit Microsoft's new dMSAs to escalate Active Directory privileges, even in domains not using them, through the BadSuccessor attack technique.
Discover advanced techniques for finding and exploiting eBPF kernel vulnerabilities through state-aware fuzzing, verifier bypasses, and JIT compiler flaws for security research.
Explore the evolving landscape of DDoS attacks and cutting-edge prevention strategies in this comprehensive cybersecurity presentation.
Uncover critical IoT security flaws through real-world examples of vulnerable devices, from WiFi credential leaks to pre-installed malware and command injection attacks.
Explore EEG-based authentication for IoT security, using brain signals as dynamic biometric identifiers to overcome traditional digital security limitations and deepfake vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.