Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Windows 8's advanced security features and exploit mitigation improvements, including enhanced ASLR, heap protection, and kernel safeguards, designed to thwart modern attack techniques.
Explore an open-source framework for combating polymorphic viruses through advanced static analysis and emulation. Learn innovative techniques for file disinfection, malware analysis, and incident response.
Explore Oracle indexing architecture, new flaws, and forensic aspects. Learn to identify issues in custom applications and understand the security implications of database indexing.
Exploring the attrition.org Errata project's 13-year journey as an IT and security industry watchdog, including insights into its history, process, impact, and future direction.
Explore advanced rootkit techniques and boot-level system manipulation with eEye BootRoot, presented by security experts Derek Soeder and Ryan Permeh.
Explore vulnerabilities in enterprise web services and learn advanced techniques for identifying and exploiting security flaws in next-generation applications.
Explore economic, physical, and psychological aspects of counter-intelligence, examining authentication protocols, learned helplessness, and interactive risk in cybersecurity.
Explore advanced SQL injection detection techniques, combining database auditing and anomaly intrusion detection for enhanced cybersecurity measures.
Explore the complex issues surrounding national identification systems with expert panelists discussing privacy, security, and societal implications.
Explore advanced techniques for file format fuzzing, uncovering vulnerabilities in software applications through systematic input manipulation and analysis.
Explore non-cryptographic methods of information loss, examining vulnerabilities and risks in data protection beyond encryption techniques.
Finalist presentations and awards for innovative network security architectures, challenging traditional perimeter-based approaches at Black Hat USA 2005.
Explore advanced exploitation techniques beyond EIP, including OP sled, return addresses, and encoders. Learn about payloads and stagers for enhanced post-exploitation capabilities.
Explore injection flaws and learn why input validation alone is insufficient for security. Discover effective strategies to protect against these vulnerabilities in web applications.
Explore social engineering tactics in corporate espionage, focusing on vulnerabilities in executive-level security and strategies for protecting high-value targets in organizations.
Get personalized course recommendations, track subjects and courses with reminders, and more.