Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore innovative reputation systems to combat social engineering and opinion manipulation in online environments, enhancing security for individuals and organizations.
Explore the synergy of data, algorithms, and computing infrastructure in AI's evolution, and discover future applications and algorithmic designs shaping next-generation AI technologies.
Explore model-based fuzzing for ARM CPUs using machine-parsable reference manuals. Learn about Scapula, an open-source tool for detecting specification violations in ARM-based platforms.
Explore the evolution of hacking in warfare, from its origins to modern cyber and information campaigns. Examine notable cases, core features, and successful strategies, while considering future cybersecurity challenges and defenses.
Exploración de ataques y vulnerabilidades en la blockchain EOS, incluyendo casos de estudio de pérdidas millonarias y análisis de CVEs especÃficos por un experto en seguridad de blockchain.
Explore the symbiotic relationship between cybersecurity and blockchain, examining past advances, missteps, and future applications for securing systems and infrastructure.
Explore BCM, a blockchain-based secure messaging platform designed by hackers for hackers. Learn about its advanced security features, end-to-end encryption, and off-the-grid communication capabilities.
Explore a heuristic-based solution for detecting known and unknown attacks on Ethereum smart contracts through blockchain transaction and storage analysis, with live demonstrations.
Explore ARM-X, an IoT firmware emulation framework for testing and vulnerability discovery. Learn its evolution, use cases, and future directions in IoT security research and development.
Análisis de la supremacÃa cuántica de Google y sus implicaciones para la ciencia, economÃa y polÃtica. Exploración de los avances en computación cuántica y sus posibles disrupciones futuras.
Exploring IC reverse engineering techniques for security assessment, including failure analysis tools, delayering methods, and circuit editing. Learn how to analyze and modify chip structures for hardware hacking.
Comprehensive guide to advanced laptop security, covering hardware virtualization, secure boot, and protection against sophisticated physical attacks. Practical tips for privacy-conscious users and security professionals.
Step-by-step guide to designing custom embedded microcontroller PCBs. Learn modular design, component selection, schematic creation, and PCB layout for successful prototyping and small-scale manufacturing.
Exploring TrustZone vulnerabilities in Samsung Galaxy smartphones using feedback-driven fuzzing on Trustonic trustlets, revealing potential security breaches in ARM's hardware isolation technology.
Detailed walkthrough of recreating an iOS jailbreak from security updates, covering vulnerability discovery, exploit development, and jailbreak creation. Includes practical demonstration and insights.
Get personalized course recommendations, track subjects and courses with reminders, and more.