Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how domestic abusers exploit technology to control victims and learn strategies to improve digital literacy and safety tools for vulnerable populations.
Essential insights for effective incident response, covering crucial aspects often overlooked by beginners. Learn from real-world experiences to enhance your preparedness and decision-making during critical cybersecurity events.
Explore nation-state techniques for breaching air-gapped networks, analyzing similarities across frameworks and providing practical advice to enhance security and detect potential attacks.
Hands-on workshop exploring real-world cryptographic vulnerabilities. Implement attacks using provided tools, gaining practical experience in identifying and understanding common cryptographic weaknesses.
Explore diverse malware implementations within techniques, analyze tool differences, and learn to build resilient detection rules by modeling procedures and evaluating similarities.
Explore techniques for exploiting API webhooks, including SSRF attacks that can lead to cloud compromise, and learn about unique attack vectors in modern web services.
Explore the journey of writing and publishing a 400-page security book, from initial concept to final product, with insights into the realities of the process.
Explore Kubernetes lateral movements, identity types, and cluster-to-cloud authentication methods. Learn about real-world misconfigurations leading to cluster takeovers and prevention strategies.
Explore secure QR code frameworks for identity verification, focusing on privacy features that allow selective attribute disclosure. Learn about SMART Health Cards and a new open-source specification.
Explore randomness types, their importance, and applications. Learn about drand, a distributed randomness software, and its role in providing public, verifiable randomness as a service.
Explore passive intelligence gathering through domain squatting, including low-cost techniques, data analysis, and defensive strategies against this cyber threat.
Explores factors influencing password quality across countries, revealing literacy levels and internet usage impact. Aims to understand macrosocial protection factors for adapting password lists.
Exploring Canada's shift from pro-innovation to regulatory approach in Internet policy, covering broadcast, news media, online harms, and privacy regulations. Unpacks recent developments and government plans.
Hands-on workshop exploring APT tactics for privilege escalation and persistence. Learn to develop stealthy implants through 7 labs on Windows process injection techniques.
Hands-on workshop exploring Web Application Firewall bypass techniques, including encoding, SQL injection, protocol switching, and syntax alternatives. Practical exercises with in-depth explanations for each method.
Get personalized course recommendations, track subjects and courses with reminders, and more.