Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore industrial control systems security challenges and protective measures for critical assets, focusing on ICS firewalls and their vulnerabilities in this technical presentation.
Intuitive overview of deep neural networks for cybersecurity, covering methods, applications, and open-source tools for detecting malicious files, URLs, and domains.
Explore advanced binary code obfuscation techniques and learn how to break them using program synthesis, symbolic execution, and taint analysis in this cutting-edge cybersecurity presentation.
Uncover vulnerabilities in popular mobile payment systems, exploring offline schemes, practical attacks, and security flaws. Learn about potential risks and remedies in this eye-opening presentation.
Explore a cutting-edge security monitoring framework for ARM processors using virtualization and OP-TEE, enhancing OS protection through innovative architecture inspired by shadow play.
Explore VSPMiner, a tool using supervised ML to detect vulnerable SEAndroid policies. Learn about differential analysis, classification optimization, and real-world applications in vendor customizations.
Explore advanced techniques to counter evolving exploit kit infrastructures, including proxy networks, VDS, and sophisticated server setups. Learn future-proof strategies for cybersecurity professionals.
Explore a worm attack targeting IoT device bootloaders, examining vulnerabilities and security implications for millions of connected devices in everyday use.
Explore advanced fuzzing techniques for uncovering vulnerabilities in ICU libraries, focusing on Unicode and globalization support in software applications across platforms.
Explore techniques to bypass Android OEM security mitigations, uncovering vulnerabilities and discussing potential improvements for enhanced mobile device protection.
Explore AES wireless keyboard vulnerabilities through template attacks, focusing on firmware analysis, side-channel attacks, and eavesdropping techniques for enhanced cybersecurity awareness.
Learn to detect breaches using AWS honey tokens, a scalable method to identify and respond to unauthorized access attempts in cloud infrastructure.
Explore key insights and conclusions from Black Hat Asia 2018, featuring expert perspectives on cutting-edge cybersecurity trends and developments.
Explore vulnerabilities in Linux device drivers due to compat system calls, focusing on security implications for 32-bit processes running on 64-bit systems.
Explore writing secure Trusted Applications using Rust's safety features. Learn about TrustZone, TEE protections, and practical examples to enhance application security.
Get personalized course recommendations, track subjects and courses with reminders, and more.