Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore HTTP header smuggling techniques to bypass security measures, attack web applications, and exploit vulnerabilities in proxy servers and AWS services.
Explore AD CS vulnerabilities for credential theft, persistence, and domain escalation. Learn offensive and defensive techniques to secure Active Directory PKI implementations.
Explore vulnerabilities in Windows Hello's face recognition, demonstrating how attackers can bypass this passwordless authentication using a crafted USB device.
Explore novel DNS vulnerabilities affecting major cloud providers, their impact on corporate networks, and potential information leakage. Learn about root causes, exploitation methods, and mitigation strategies.
Explore secure integration of serverless technology with data center services, focusing on workload identity in AWS Lambda and bridging identity between on-premises and cloud environments.
Explore techniques to bypass secure bootloaders, including signature verification vulnerabilities, memory analysis, and firmware update exploits. Learn to identify and exploit weaknesses in modern device protection mechanisms.
Explore novel APT techniques targeting Microsoft 365, including persistent access methods and data extraction. Learn technical details, potential extensions, and prepare for emerging threats.
Explore OPC-UA protocol vulnerabilities and potential cyberattack vectors in industrial communication systems. Learn about attack surfaces, exploitation techniques, and security implications for Industry 4.0 environments.
Explore building a custom cloud-native SIEM solution, discussing considerations, requirements, and benefits compared to vendor options. Learn about cost savings and improved capabilities.
Investigates 5G security mechanisms against IMSI catchers, exploring vulnerabilities and protection techniques through practical experiments with commercial devices.
Explore electromagnetic fault injection to bypass security in automotive ECUs, demonstrating potential vulnerabilities in modern vehicle systems through practical examples and live demonstrations.
Explore a human-centric approach to cybersecurity, challenging traditional views and examining how Airbus integrates this perspective into their global program for enhanced protection.
Explore advanced offensive techniques for exploiting macOS management platforms, including MDM and Jamf, to gain unauthorized access and control over enterprise systems.
Explore IoT vulnerabilities in capsule hotels, revealing how six exploits can be combined to control bedrooms and potentially disrupt noisy neighbors.
Explore the risks of deepfake technology in social engineering, learn about a new framework for understanding these attacks, and discover practical countermeasures to protect against synthetic media threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.