Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore remote code execution vulnerabilities in physical security systems, learning to exploit and disarm alarms through reverse engineering and network protocol analysis.
Explores a novel attack surface in Safari, focusing on vulnerabilities in system libraries like audio. Demonstrates how a single Web Audio vulnerability can be exploited to compromise Safari's security.
Unveils new Android WebView vulnerabilities related to JavascriptInterface, bypassing all verifications. Presents a novel attack model and discusses security implications for mobile app developers.
Explore the impact of security vulnerabilities and data breaches on stock prices across industries, analyzing recovery patterns and sector-specific effects through historical data analysis.
Explore techniques for analyzing and fuzzing Qualcomm Hexagon processors, overcoming challenges in firmware analysis, emulation, and hardware-dependent targets for enhanced security research.
Explore innovative techniques for uncovering vulnerabilities in Industrial Control Systems through in-field emulation and fuzzing of PLCs, focusing on proactive security measures beyond network-level exploits.
Explore the journey of creating and mass-producing hacking devices, from initial concept to final product. Learn about R&D, quality assurance, and manufacturing challenges in hardware development.
Explores top 10 HTML5 security threats, including CORS attacks, clickjacking, XSS, web storage vulnerabilities, and more. Demonstrates real-life examples and discusses defense strategies against emerging attack vectors.
Explore advanced techniques for exploiting software vulnerabilities through information leaks, focusing on defeating ASLR and converting various vulnerabilities into effective info leaks.
Explore Flash Player sandbox implementations, their architectures, mechanisms, and security limitations. Learn about potential vulnerabilities and sandbox escape techniques in this in-depth analysis.
Exploring vulnerabilities in industrial control systems through firmware analysis, revealing backdoors and security flaws in critical infrastructure devices like PLCs, smart meters, and SCADA systems.
Explore tools and techniques for defeating certificate pinning in mobile apps during black-box testing, enabling interception of SSL traffic on both iOS and Android platforms.
Journey through reverse engineering a 3G microcell, covering hardware hacking, kernel reversing, firmware manipulation, software reversing, networking, memory forensics, and social engineering. Insights into successes, failures, and lessons learned.
Discover social engineering techniques to improve organizational security acceptance, bridging the gap between users and InfoSec teams for better awareness and policy adherence.
Explore vulnerabilities in payment terminals, including memory corruption issues and potential attack vectors. Learn about code execution risks and discuss profitable payloads for attackers.
Get personalized course recommendations, track subjects and courses with reminders, and more.