Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced web tracking techniques for identifying and monitoring potential security threats, covering active and passive fingerprinting, user unmasking, and cross-platform implementation.
Explora técnicas avanzadas de explotación del heap del kernel de iOS, incluyendo ataques a metadatos, objetos C++ y control del heap, con énfasis en nuevos métodos más allá de la lista libre.
Explore Windows authentication vulnerabilities and learn how password hashes can be exploited to access sensitive data across various enterprise services, even 15 years after discovery.
Explore SQL injection techniques to exploit buffer overflows and gain root access to Netgear routers, including file extraction and live demonstration of vulnerabilities in SOHO devices.
Explore security vulnerabilities in ADS-B technology and potential threats to air traffic control systems, including practical demonstrations of data injection and visualization techniques.
Explore legal frameworks for cyberspace operations, including network security, defense, exploitation, and attack. Gain insights into recent incidents and their legal classifications.
Discover reliable techniques for exploiting common local Windows kernel vulnerabilities across multiple versions, including previously challenging exploits.
Explore hardware vulnerabilities in secure systems through a side-channel attack on RSA signatures, demonstrating how induced faults can compromise software-secure systems and extract private keys.
Proactive defense strategies: intelligence gathering, modeling, and expanding defender roles. Maximize existing resources for effective security posture against penetration testers and red teams.
Techniques for exploiting randomness vulnerabilities in PHP applications, focusing on password reset token predictability and demonstrating account takeover through PRNG prediction.
Practical approach to reverse engineering embedded systems through power analysis. Explores experimental protocol, tools, and techniques for extracting code without physical access to internal components.
Explore jemalloc memory allocator's architecture, attack vectors, and novel exploitation techniques, focusing on Mozilla Firefox's heap and its security implications.
Explore strategies for combating persistent cyber threats, focusing on inhibiting attacker activities, enhancing detection capabilities, and improving rapid response techniques for effective intrusion remediation.
Explore mitm attacks on anonymous services and learn to create JavaScript botnets for analyzing connections, uncovering activities of malicious actors behind these services.
Explora la seguridad de NFC en dispositivos móviles, analizando protocolos, vulnerabilidades y posibles ataques. Incluye demostraciones prácticas de explotación y recomendaciones para mejorar la protección.
Get personalized course recommendations, track subjects and courses with reminders, and more.