Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover China's healthcare sector strategic goals and intelligence requirements through expert analysis of technological ambitions and information gathering patterns.
Explore reconfigurable HSMs built on FPGA technology that adapt to cryptographic changes without hardware replacement, overcoming traditional HSM rigidity limitations.
Discover counterfeiting techniques for event credentials through social engineering, arts & crafts, and observation to defeat security measures like UV ink and holograms.
Discover how AI-powered hardware revolutionizes medical workflows with on-device LLMs, custom boards, and portable inference for bedside clinical decision-making.
Explore hardware supply chain transparency through HBOMs, uncovering hidden risks in semiconductor provenance and developing tools for better hardware security accountability.
Explore maritime cybersecurity through nautical rules of the road, focusing on why cyber manipulation of port turns poses greater risks than starboard maneuvers in vessel collisions.
Explore 10 years of IoT security evolution with industry experts discussing lessons learned and current state of IoT security at DEF CON's IoT Village.
Discover the serendipitous side of bug bounty hunting through real-world examples of unexpected vulnerabilities that found the hunter, not the other way around.
Explore maritime cybersecurity by analyzing NMEA2000 networks, developing sensor fingerprints, and understanding vessel control system vulnerabilities through hands-on research.
Uncover how threat actor MUT-1244 targets security researchers through trojanized exploits and fake GitHub profiles, plus learn detection methods and attribution techniques.
Discover how power grid failures stem from physics, not cyberattacks, through real-world case studies of oscillations, equipment failures, and system protection mechanisms.
Uncover vulnerabilities in car tire pressure monitoring systems and learn to capture unencrypted wireless signals with low-cost hardware for tracking and spoofing attacks.
Explore offensive security techniques for testing satellites, ground stations, and space infrastructure as commercial space systems become prime cyber targets.
Explore SDN-SDR frameworks for secure maritime communications using SATCOM infrastructure to address IoS, UAV, and AUV security challenges in dynamic environments.
Discover how anyone can launch spoofed DDoS amplification attacks from any IP address on the Internet and learn about this critical vulnerability that could trigger a Tunnelpocalypse.
Get personalized course recommendations, track subjects and courses with reminders, and more.