Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cutting-edge particle physics research beyond the LHC, focusing on flavor factories like Belle II and their quest to understand matter-antimatter asymmetry and dark matter through precision measurements.
Explore cutting-edge particle physics research beyond the LHC, focusing on flavor factories like Belle II and their quest to solve fundamental mysteries of matter, antimatter, and dark matter through precision measurements.
Delve into the complex challenges of cybersecurity regulations in medical device manufacturing, exploring compliance requirements, industry evolution, and critical implementation hurdles for manufacturers.
Delve into the complex challenges of cybersecurity regulations in medical device manufacturing, exploring compliance requirements, industry evolution, and critical security considerations for healthcare technology.
Uncover security vulnerabilities in Bluetooth LE Audio's Auracast feature, exploring encryption weaknesses, authentication flaws, and practical attack methods for broadcast hijacking.
Uncover security vulnerabilities in Bluetooth LE Audio's Auracast feature, exploring encryption weaknesses, broadcast hijacking risks, and practical attack demonstrations with a specialized toolkit.
Dive into the security vulnerabilities of Bluetooth LE Audio's Auracast feature, exploring encryption weaknesses, broadcast hijacking risks, and practical tools for testing broadcast security.
Delve into reverse engineering of RF microcontrollers, uncovering hidden capabilities of SimpleLink MCUs and learning to modify RF subsystems for custom wireless protocols and SDR applications.
Unlock the hidden potential of RF microcontrollers through reverse engineering, focusing on TI SimpleLink MCUs to understand internal radio operations and create custom firmware modifications.
Explore the digital infrastructure limitations in German prisons, examining management systems and the implications of restricted technology access for over 40,000 incarcerated individuals.
Explore gender stereotypes and discrimination in cybersecurity through real experiences, examining why non-traditional profiles might find cybercrime more appealing than legitimate tech careers, while proposing solutions for equality.
Dive into a comprehensive analysis of Android native libraries across 8M+ apps, exploring vulnerability patterns, binary similarity methods, and the startling state of security patching in the Android ecosystem.
Entdecke faszinierende Einblicke in die Herausforderungen und unerwarteten Vorteile von nicht-stereotypischen Personen in der Cybersecurity und Cyberkriminalität, basierend auf persönlichen Erfahrungen und Interviews.
Explore the intricate world of financial crime through real case studies, examining how tax fraud, money laundering, and corruption schemes operate using surprisingly simple yet chained tactics.
Get personalized course recommendations, track subjects and courses with reminders, and more.