Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover a security researcher's journey from testing Microsoft's phishing simulation tools to discovering critical vulnerabilities in Microsoft 365 that enabled unauthorized tenant access and data exfiltration.
Explore the global battle for net neutrality, examining telecom industry lobbying, civil society resistance, and the critical fight to preserve open internet access across Europe and Latin America.
Explore the global battle for net neutrality, examining telecom industry lobbying, civil society resistance, and the fight to preserve open internet through cases from Europe and Latin America.
Uncover how data brokers exploit mobile app data for mass surveillance, revealing sensitive location data of government officials and the urgent need for stronger data protection measures.
Uncover die erschreckenden Sicherheitslücken bei VW's Datensammlung von 800.000 E-Autos - von ungeschützten Bewegungsprofilen bis zu persönlichen Informationen der Fahrzeugbesitzer.
Entdecke die kritische Analyse zur Datensicherheit bei VW, wo Bewegungsdaten von 800.000 E-Autos und persönliche Informationen ungeschützt im Netz standen - mit Fokus auf Datenschutz und Privatsphäre.
Uncover die kritische Sicherheitslücke bei VW, die Bewegungsdaten und persönliche Informationen von 800.000 E-Autos offenlegte, und erfahre über die weitreichenden Datenschutzimplikationen dieser Sammlung.
Delve into eine unterhaltsame und kritische Rückschau auf IT-Sicherheitsvorfälle des vergangenen Jahres, mit Analysen zu Mustern und Zukunftsprognosen für kommende Herausforderungen.
Discover how to port coreboot to modern Intel systems, from identifying compatible mainboards to implementing payloads and running mainline Linux. Includes insights on AMD systems and OpenSIL developments.
Explore how infrastructure teams can move beyond tool-centric monitoring to develop meaningful observability practices that align with organizational goals and leverage open-source solutions effectively.
Explore the inner workings of Apple and Google's Bluetooth tracking networks, including hands-on demonstrations of sniffing and analyzing BLE signals using common hacking tools.
Delve into Windows 11's new compression format support and discover critical security vulnerabilities in libarchive, including RCE risks and their widespread impact across multiple platforms and applications.
Delve into die ökologischen und sozialen Auswirkungen des KI-Booms, von steigendem Energieverbrauch bis zu Menschenrechtsverletzungen, und erfahre wie Big Tech von dieser Entwicklung profitiert.
Discover essential insights into Single Sign-On implementation, common pitfalls, and security considerations to protect your organization through effective questioning and configuration validation.
Get personalized course recommendations, track subjects and courses with reminders, and more.