Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to leverage LLMs for dynamic threat modeling, transforming static security assessments into continuous, adaptive processes that respond to evolving cybersecurity challenges.
Discover how to exploit Bluetooth vulnerabilities in Raspberry Pi devices using Braktooth, exploring security implications, attack demonstrations, and practical mitigation strategies for IoT security.
Discover how AI models like WhiteRabbitNeo revolutionize cybersecurity by automating threat analysis, vulnerability research, and exploit development while enhancing DevSecOps efficiency.
Explore real-world physical security breaches and learn practical techniques for identifying vulnerabilities through engaging stories and professional insights from hands-on experience.
Discover how to transition into cybersecurity from a non-technical background through networking, hands-on experience, and community engagement, illustrated by a lawyer's successful career change journey.
Explore MITRE's ATLAS framework and real-world case studies revealing critical AI system vulnerabilities, security risks, and notable attacks beyond simple LLM jailbreaking.
Explore the controversial topic of ransomware decriminalization, examining potential impacts, ethical considerations, and policy implications for cybersecurity and law enforcement.
Explore cloud security risks in Git repositories, focusing on common misconfigurations and best practices for protecting sensitive information in version control systems.
Learn to create a private AWS security training lab using SecDevOps-Cuse/CyberRange. Explore automation, vulnerability management, and offensive security in a safe cloud environment.
Explore the rise of spear phishing, learn to identify vulnerable targets through social media, and discover effective protection strategies for individuals and organizations.
Explore Magecart's evolution, tactics, and techniques in compromising e-commerce sites for credit card skimming. Learn about high-profile breaches and the criminal underworld behind this cybercrime phenomenon.
Explore libpcap for offensive security: bypass firewalls, intercept traffic, manipulate network connections, and evade detection. Hands-on techniques with source code provided.
Explore the fascinating takedown of major darknet markets, including AlphaBay and Hansa, in this talk on international law enforcement operations, deception, and cybercrime investigations.
Maximizing security awareness through a champions program: scaling up, improving communication, enhancing security cost-effectively, and boosting incident reporting. Aligning with company culture for effective implementation.
Humorous exploration of data protection practices, contrasting organizations' claims with real-world breaches. Offers insights on improving security measures while highlighting both progress and challenges.
Get personalized course recommendations, track subjects and courses with reminders, and more.