Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore essential cryptographic concepts behind TLS, including asymmetric and symmetric keys, keystores, truststores, and mutual TLS, explained with accessible analogies.
Optimize multi-process Python apps with Monoceros: Improve CPU utilization, reduce variance, and enhance latency by 20%. Learn about in-pod load balancing for efficient system performance at scale.
Explore the transition from multiple telemetry agents to OpenTelemetry Collector, discussing challenges, performance improvements, and simplification of monitoring infrastructure.
Explore CyberCIEGE's network security simulation game, its Scenario Development Kit, and techniques for creating customized scenarios to teach cybersecurity concepts through interactive storytelling.
Explore a game-based approach to engage developers in threat modeling, enhancing software security through interactive and non-threatening techniques.
Explore how balancing difficulty in cybersecurity competitions can improve student engagement and retention, addressing the decline in novice participation and promoting career interest.
Explore SecurityEmpire, a multiplayer game teaching cybersecurity to high school students. Learn about its design, implementation, and effectiveness in promoting information assurance practices through engaging gameplay.
Explore a robust one-time-password token authentication system for multi-site use, featuring Kerberos support, fault tolerance, and minimal management overhead. Learn from LIGO's real-world implementation and experiences.
Exploring browser-based red pills to detect virtual environments, their impact on web malware scanners, and potential mitigations for enhanced cybersecurity.
Optimizations to ZMap network scanner achieving 10-fold increase in scan rate, enabling comprehensive TCP port scanning across IPv4 address space in 4.5 minutes. Discusses implications and potential applications.
Explore Google's "Push On Green" system for automated, safe production updates with minimal engineer involvement and downtime. Learn to implement similar practices in your environment.
Learn about PowerShell Desired State Configuration, a standards-based platform enabling configuration management across Windows, Linux, and other devices, addressing challenges faced by traditional CM systems.
Explore how checklists can significantly reduce human error in IT, drawing insights from aviation and surgery to improve reliability and efficiency in technical operations.
Explore responsible risk-taking in DevOps through effective pre-production environments. Learn techniques for building powerful testbeds with minimal resources, balancing experimentation and efficiency.
Researchers expose security vulnerabilities in traffic signal systems, demonstrating potential for disruption and safety risks. Recommendations for improving embedded systems security are provided.
Get personalized course recommendations, track subjects and courses with reminders, and more.