Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore zero-click vulnerabilities in smart UPS devices, uncovering potential remote takeover risks and physical threats. Includes demonstration of exploits and discussion on cybersecurity implications.
Explore vulnerabilities in P2P protocols used by smart cameras, including Kalay Platform analysis, device-specific exploits, and remote code execution demonstrations. Learn about IoT security risks and mitigation strategies.
CXO panel explores digital identity protection in fintech, discussing latest security technologies and strategies to safeguard user data in the evolving financial technology landscape.
Automated firmware testing using Fuzzware: emulate and fuzz embedded systems without hardware. Discover vulnerabilities in network stacks and scale security analysis for diverse devices.
Explore GNU Anastasis, a privacy-focused key backup and recovery system. Learn about its cryptographic design, system architecture, and integration possibilities for enhanced digital security and self-custody solutions.
Insights into high-stakes code reviews for critical software. Learn techniques for rapid, effective security assessments of cryptographic libraries, cloud-native software, and smart contracts from Trail of Bits' CEO.
Explore evolving ransomware threats and tactics, analyzing data from thousands of incidents to provide deep insights and contrarian perspectives on this critical cybersecurity issue.
Learn cloud security best practices, resource hardening, security posture tracking, and threat protection from industry experts. Gain insights on securing cloud resources and improving visibility.
Learn Android architecture, analysis types, and SSL pinning bypass methods to kickstart your journey into Android penetration testing. Gain practical insights and tool knowledge for mobile security assessment.
Hands-on workshop exploring CVE-2018-9206 file upload vulnerability in Docker. Learn about causes, patches, and bypasses for this security flaw through practical exploitation exercises.
Explore Android malware hunting using YARA framework. Learn techniques to identify and track malicious apps, even without direct access, and discover methods for detecting similar variants in the wild.
Explore how artificial intelligence is being leveraged to combat pandemics, discussing innovative applications and potential future developments in healthcare.
Hands-on workshop exploring Red, Blue, and Purple team activities using Azure components. Learn container deployment, routing, attack simulation, detection, and prevention techniques in a practical cybersecurity setting.
Detailed analysis of Magecart attacks on e-commerce sites, exploring how attackers steal credit card data through client-side JavaScript and strategies to protect against these threats.
Explore dependency confusion attacks and how unclaimed packages in project files can lead to remote code execution. Learn about real-world vulnerabilities and mitigation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.