Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore TLBleed, a novel side-channel attack leaking information from Translation Lookaside Buffers, demonstrating vulnerabilities beyond CPU caches and challenging current security measures.
Explore smartphone baseband security, learn to find and exploit memory corruption bugs in modern devices. Gain insights into design, countermeasures, and practical hacking techniques.
Explore kernel sanitizers, XNU syscall API patterns, and code coverage techniques for Apple systems. Live demo of macOS root access using 0-day vulnerabilities discovered through fuzzing.
Dive into the internals of Windows Defender's antivirus emulator, exploring its binary analysis techniques for potentially malicious PE files. Gain unique insights into reverse engineering antivirus systems.
Explore Microsoft's approach to mitigating speculative execution vulnerabilities, including research, collaboration, and industry-wide efforts. Learn about Spectre, Meltdown, and strategies for robust security measures.
Explore FuzzExMachina, a framework for efficient fuzz testing. Learn how it uncovered 11 crashes and 6 exploitable vulnerabilities in Arch Linux packages, simplifying security analysis.
Explore the Rowhammer bug in DRAM modules, its security implications, exploitation techniques, and potential mitigations in this comprehensive overview of hardware vulnerabilities.
Explore TLS 1.3's 0-RTT feature, its risks, and real-world replay attacks. Learn about potential solutions and mitigation controls for secure deployment of TLS 1.3-supported software.
Explore security vulnerabilities in mobile payment systems, focusing on economic implications, fraud risks, and outdated card standards. Learn about testing methods and potential attack vectors.
Explore PHP unserialization vulnerabilities, including RCE exploits in popular web applications. Learn attack methodologies, file formats, and defense strategies.
Explore containerization's impact on offensive security operations, focusing on Docker's implications for penetration testing and multi-container application vulnerabilities.
Explore unique skills individuals with Autism Spectrum Disorder bring to cybersecurity, enhancing workforce diversity and effectiveness in addressing complex security challenges.
Detailing Tesla car hacking techniques, including remote compromises of gateway, BCM, and Autopilot ECUs. Explores vulnerabilities, attack chains, and Tesla's security enhancements in response.
Explore vulnerabilities in satellite communication systems, including potential cyber-physical attacks on maritime, aviation, and military sectors. Learn about security flaws and their real-world implications.
DeepLocker: AI-powered targeted attacks using deep neural networks for evasive malware. Explores mechanisms, implications, and defenses against AI-weaponized cybercrime.
Get personalized course recommendations, track subjects and courses with reminders, and more.