Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the Twitter bot economy and learn a three-step methodology to track down bots: dataset building, attribute identification, and classifier development for accurate large-scale detection.
Explore the async_wake exploit for iOS 11.1.2, examining each step and the mitigations overcome. Gain insights into iOS security vulnerabilities and exploitation techniques.
Análisis de vulnerabilidades en la función hash Curl-P de IOTA, revelando debilidades criptográficas que permiten falsificar firmas digitales en esta criptomoneda de alto perfil para el Internet de las Cosas.
Explore new technology bridging privacy and access gaps in domain name registration data, enhancing cybersecurity through differentiated access and automated systems.
Explore the evolving landscape of bots and robots, their impact on society, and the legal implications as they transition from digital to physical realms.
Explore vulnerabilities in data center Baseboard Management Controllers (BMCs), uncovering potential security risks and their implications for critical infrastructure.
Explore Ethereum smart contract vulnerabilities, reverse engineering techniques, and new tools for analyzing blockchain attacks through real-world examples and practical demonstrations.
Explore automotive firmware extraction and analysis techniques, focusing on fault injection and emulation for uncovering vulnerabilities in vehicle security systems.
Explore compression oracle attacks on VPN networks, including browser requests and ESP compression. Learn detection methods, setup requirements, and potential future threats.
Explores attribution fatigue in cybersecurity, examining nation-state hacking, stolen toolchains, and the evolution of cyber threats beyond espionage into active operations.
Explore remote attack vectors targeting system firmware, including networking and updates. Learn about exploiting UEFI vulnerabilities for installing persistent implants at scale.
Explore the connection between stress, addiction, and relapse in InfoSec, with personal insights on alcohol use disorder and tips for fostering inclusive, supportive work environments.
Explore how to create engaging digital security solutions that generate real business outcomes and reduce enterprise risk, beyond just focusing on algorithms.
Explore automated malware analysis using Xori, an open-source disassembler. Learn to identify suspicious functionality and contribute to this valuable cybersecurity tool.
Explore the potential of Software Bill of Materials (SBOM) to revolutionize information security, addressing industry resistance and highlighting its benefits for transparency and enterprise value.
Get personalized course recommendations, track subjects and courses with reminders, and more.