Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore OpenPV, a browser-based tool using WebGL and open geodata to simulate photovoltaic potential on buildings in real-time, from its development as a hobby project to receiving German government funding.
Entdecke Transitous, einen offenen Routingdienst, der das Problem fragmentierter Verkehrsbetrieb-APIs löst und vollständige Routen für öffentliche Verkehrsmittel über größere Entfernungen mit einer einzigen Anfrage ermöglicht.
Explore the evolving digital arms race between activists and government surveillance through case studies from Amnesty International's Security Lab, examining recent threats, progress in accountability, and emerging challenges.
Entdecke BinDa, eine Open-Source-Software zur Anwesenheitserfassung für Schulen, entwickelt mit Unterstützung des Prototype Fund und in Zusammenarbeit mit vier Schulen, um freie Software in der Schullandschaft zu fördern.
Explore the inner workings of microcontroller debug protocols like JTAG and SWD, from physical wire signals to implementing breakpoints and memory access in embedded systems.
Discover the essential technical basics of digital accessibility for programmers, cutting through the complexity to help you get started with practical implementation strategies.
Entdecke, wie du mit Bluetooth Low Energy seltsame Geräte fernsteuern und bauen kannst - ohne Programmierung. Lerne die Grundlagen von BLE und nutze das BLEnky-Projekt für schnelle Ergebnisse bei deinen Smart-Gadget-Projekten.
Discover how to reverse engineer the ESP32's Wi-Fi peripheral to build an open source stack, unlocking capabilities for pentesting, mesh routing, and AirDrop clients while learning about Wi-Fi internals.
Entdecke, wie du mit Nextcloud deine eigene Cloud-Lösung zu Hause aufbaust – von der Hardware-Auswahl bis zur sicheren Internetanbindung. Ein praktischer Leitfaden für mehr Datenkontrolle und Privatsphäre.
Explore the intersection of ballet, fluid computing, and cosmetics in this visual essay on alternative hardware history, where minerals and fluids create tactile experiments challenging traditional circuit morphologies.
Explore the dark corners of file formats, from deceptively simple challenges to complex constructs like near-polyglots, timecryption, and hashquines, with insights on how security has evolved in the decade since "Funky File Formats."
Explore submarine engineering failures, from TITAN to historical disasters, examining design flaws, safety oversights, and lessons for project management and engineering ethics.
Discover Reticulum, a cryptography-based networking stack for building sovereign communication networks without surveillance or censorship, using readily available hardware and operating even in adverse conditions with high latency and low bandwidth.
Delve into the critical analysis of AI-based targeting systems like Lavender used in military operations, examining ethical implications, responsibility shifts, and potential legal circumventions in modern warfare.
Discover how Hollywood hackers combine prototyping and art to create movie magic, as filmmaker Davis DeWitt shares real-world examples and techniques from smoke grenades to car explosions in the film industry.
Get personalized course recommendations, track subjects and courses with reminders, and more.