Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how hackers and technologists protect communities through cyber volunteering, ransomware response, and grassroots defense initiatives in this DEF CON update.
Uncover critical security vulnerabilities in Wi-Fi Easy Connect protocol through comprehensive analysis revealing how usability enhancements can compromise network security.
Uncover the hidden privacy risks and data flows within Apple Intelligence through traffic analysis and OS inspection techniques, challenging Apple's security claims.
Explore student data privacy vulnerabilities and third-party access risks in higher education systems through real-world case analysis and security insights.
Discover how to exploit MIDI protocol vulnerabilities in Yamaha keyboards through hardware reverse engineering, JTAG, UART, and firmware analysis to achieve remote code execution.
Explore satellite network vulnerabilities and DDoS attack methodologies targeting Low Earth Orbit constellations, plus defensive countermeasures for critical space communications.
Discover how secure coding practices can be leveraged as critical infrastructure to influence policy changes and create positive societal impact through cybersecurity advocacy.
Discover how a threat actor's OPSEC mistake exposed their entire cybercrime operation through intercepted Telegram C2 communications, revealing malware tactics and infrastructure mapping.
Discover how security researchers exposed a dark web assassination marketplace, intercepted murder orders, and collaborated with global law enforcement to prevent killings and secure convictions.
Master a refined methodology for Purple Team engagements using Assumed Compromise approach to enhance detection capabilities and organizational cyber resilience.
Discover how to decrypt embedded device firmware using practical techniques, even without deep cryptographic knowledge or specialized hardware access.
Discover real-world ATM hacking techniques, penetration testing war stories, and cybersecurity vulnerabilities that can make machines dispense cash unexpectedly.
Uncover client-side deanonymization attacks that exploit Google's Privacy Sandbox APIs, revealing how debugging reports, destination hijacking, and storage vulnerabilities can compromise user privacy.
Uncover how Chinese hackers build private relay networks to hide their tracks, exposing their tools, techniques, and infrastructure through detailed forensic analysis.
Discover how to exploit and defend against common vulnerabilities in "locked down" operator workstations through real-world penetration testing scenarios and practical hardening techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.