Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical strategies for immediate cybersecurity improvements. Learn actionable steps to enhance your organization's defense posture and implement effective security measures.
Explore Active Directory security challenges and solutions with expert Sean Metcalf. Gain insights into vulnerabilities, attack vectors, and effective defense strategies for robust AD protection.
Learn to implement secure continuous delivery practices in just 60 minutes. Explore key concepts, tools, and strategies for integrating security into your development pipeline efficiently.
Explore NFC payment vulnerabilities through relay and replay attacks, uncovering potential security risks in contactless transactions.
Learn techniques for reverse engineering black box systems using GreatFET and Facedancer tools, presented by experts Dominic Spill and Kate Temkin at the TROOPERS18 conference.
Explore car hacking fundamentals, techniques, and potential vulnerabilities in modern vehicles. Learn about automotive security challenges and emerging threats in connected cars.
Explore the fascinating world of cloud seeding, its techniques, applications, and potential impacts on weather modification and climate control.
Uncover vulnerabilities in long-standing standards and explore their implications for IoT security in this eye-opening talk by Paul Meller.
Explore Windows 10 security enhancements with experts Evan Pena and Christopher Truncer, covering latest improvements and their impact on enterprise defense strategies.
Explore the transition from web pages to the Internet of Things, examining security implications and future challenges in connected devices and systems.
Explore hardware hacking techniques using Metasploit's Hardware Bridge, enabling IoT device exploitation and automotive system penetration testing.
Explore techniques for maximizing digital world benefits, focusing on PUFs (Physically Unclonable Functions) and their applications in cybersecurity and IoT environments.
Explore advanced authentication techniques and strategies for robust security in modern systems with expert insights from Pete Herzog.
Explore the capabilities and limitations of robots through robo-ethnography, examining their potential impact on society and human interaction.
Explore BLE authentication challenges in IoT devices, focusing on design issues and security implications for connected systems. Learn about potential vulnerabilities and best practices.
Get personalized course recommendations, track subjects and courses with reminders, and more.