Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores legal implications of active cyber defense, covering technology, information control, and controversial practices. Emphasizes importance of collaboration between security professionals and legal counsel.
Unveiling spyphone attacks: A proof-of-concept technique bypassing mobile malware detection and MDM features, demonstrating vulnerabilities in mobile security and surveillance risks.
Explore legal risks for security researchers under the Computer Fraud and Abuse Act, including key cases, implications, and strategies to avoid legal trouble in cybersecurity work.
Explore Bugwise, a free online service for detecting software bugs through decompilation and data flow analysis, showcasing its success in finding vulnerabilities in Debian Linux.
Insights from a record-breaking DDoS attack: strategies, vulnerabilities, and defensive measures for safeguarding networks against evolving cyber threats.
Explore techniques for identifying and defending against long-term network intrusions by foreign intelligence agencies, with insights on open-source tools for detecting impersonation attacks.
In-depth analysis of APT attacks targeting Taiwan, showcasing automated detection systems, forensic techniques, and insights into attacker operations. Includes release of collaborative APT classification platform.
Advanced SQL injection techniques for bypassing firewalls and intrusion detection systems, including optimization methods and the Leapfrog framework for testing security measures.
Profiling and analyzing real-world attacks on industrial control systems, revealing surprising findings about attacker tactics, origins, and motivations in ICS security.
Exploring vulnerabilities in Windows Font Scaler Engine, including its structure, smart fuzzing methods, and potential attack vectors. Demonstrates new TrueType font vulnerabilities on Windows 8 and 7.
Explore the analysis and exploitation of Twine, a consumer IoT device, through reverse engineering, traffic capture, and firmware analysis. Learn techniques for understanding embedded systems.
Innovative machine learning tool for automated malware capability detection, trained on web technical documents. Provides probabilistic and traceable output for rapid reverse engineering of active malware variants.
Exploitation techniques for Teridian 8051-based SoCs in smart grid systems, covering architecture, security barriers, and methods to gain code execution and firmware access.
Explore vulnerabilities in cloud-based DDoS protection services and learn techniques to bypass and unmask protected websites using the "No Cloud Allowed" tool.
Explores weaknesses in DDoS mitigation techniques, demonstrating bypass methods for various protection layers. Introduces a PoC tool for near-perfect mitigation evasion, highlighting vulnerabilities in current defense strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.