Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for using memory-mapped files to conceal malicious payloads and execute code, evading antivirus detection.
Discover how to reverse engineer a wireless SD card's firmware using open-source tools, uncovering its architecture and operating system to achieve code execution.
Explore Edge Side Include injection, a web attack vector exploiting caching servers. Learn how this legacy technology can lead to SSRF and session hijacking vulnerabilities in modern web infrastructure.
Explore the dynamic evolution of malware and security measures using machine learning to quantify adaptation rates in the ongoing cybersecurity arms race.
Explore Miasm's reverse engineering capabilities, from basic framework to symbolic emulation and malware analysis tools. Learn disassembly, code emulation, and advanced techniques for tackling complex software.
Discover a machine learning classifier for data-driven vulnerability prioritization, enhancing risk management strategies and improving decision-making in cybersecurity.
Explora las vulnerabilidades en la memoria de solo lectura de iOS, analizando ataques DMA y explotando fallas en IOSurfaceAccelerator para lograr ejecución de código arbitrario y jailbreak.
Explore hacking career progression strategies, from risk-taking to problem-solving, mentorship, and giving back. Learn to navigate your journey based on technical preferences and salary aspirations.
Learn techniques to detect and mitigate credential compromise in AWS, a widespread concern for cloud-based companies. Explore various attacker motives and outcomes.
Explore how autonomous peer communication enhances organizational phishing detection through user education and marketing tools in information security awareness programs.
Explore the rising Asian dark web markets, their usage patterns, and user motivations. Gain insights into new research findings across various Asian countries' dark web landscapes.
Explore automated malware analysis using Xori, an open-source tool for efficient triage and disassembly. Learn to process high volumes of malware and improve analysis capabilities at scale.
Uncover the risks of security product interactions with online scanners, exploring information leaks, zero detection issues, and practical examples for improved cybersecurity.
Explore cognitive stress in cyber operations, its impact on performance, and strategies to manage it. Learn about human factors in high-stakes hacking environments and their implications.
Explore how evolving laws and policies are reshaping information security in the digital age, examining key legal challenges and their impact on technology and data protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.