Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore novel ML model vulnerabilities, including malware distribution and data exfiltration. Learn to create, distribute, and analyze ML malware, with insights on threat hunting and mitigation strategies.
Revelación de ataques de APT chinos a dispositivos de borde, incluyendo un 0-day en routers de vigilancia. Se analizan casos de estudio y se proponen estrategias de mitigación.
Explore an open-source framework for deciphering cloud console logs, enhancing threat detection and incident response in cloud environments. Learn to differentiate user actions from system-generated events.
Análisis de las operaciones cibernéticas militares de China y el papel de la Fuerza de Apoyo Estratégico, examinando su evolución, capacidades y desafÃos en el contexto geopolÃtico del Indo-PacÃfico.
Uncover a critical DCOM vulnerability allowing remote privilege escalation to Domain Admin in Windows networks. Learn about DCOM internals and exploit techniques for Active Directory takeover.
Explore device authentication in Entra ID, uncovering vulnerabilities in Conditional Access. Learn about attack methods, defense strategies, and gain insights into Microsoft's cloud security infrastructure.
Explore novel approaches to bypass Managed Identities security in Azure Functions and Machine Learning, uncovering vulnerabilities that allow stealthy persistence and token extraction.
Explore the root causes of Content Security Policy bugs in web browsers, their lifecycle, and insights for both attackers and defenders using automated analysis tools.
Explore cryptography's vulnerability to bad randomness, examining real-world attacks and proposing novel solutions to enhance security in digital systems and blockchain transactions.
Explore security vulnerabilities in Android debug modules, focusing on vendor-specific implementations. Learn about attack surfaces, real-world cases, and mitigation strategies for Android ecosystem security.
Explore Windows RDP client vulnerability research: from initial steps to uncovering remote code execution flaws. Learn about fuzzing tools, overcoming challenges, and recommendations for RDP security.
Uncovers critical vulnerabilities in BIOS image parsing libraries, allowing attackers to exploit boot processes for code execution and compromising system security at the firmware level.
Dissection of an iOS 0-day exploit used by private sector offensive actors, exploring its capabilities, impact, and implications for cybersecurity and government surveillance.
Unveils vulnerabilities in PowerVR GPU, demonstrating exploits using OpenGL APIs. Explores physical page UAF issues in sparse texture memory management, offering detection solutions and a device rooting demo.
Reverse-engineering of Siemens S7-1500 PLC reveals security vulnerabilities, including obfuscated communication and modified cryptography, demonstrating persistent weaknesses a decade after Stuxnet.
Get personalized course recommendations, track subjects and courses with reminders, and more.