Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore tools and practices for identifying vulnerabilities in smart contracts, presented by security consultants with real-world experience in contract development.
Uncover the hunt for remote iOS ransomware attacks using profile installation. Learn how these "death profiles" hijack screens and crash systems, and explore techniques to defeat this emerging threat.
Discover a novel attack against Windows CFG, enabling arbitrary code execution by evading integrity checks. Learn about the design vulnerability, attack construction, and potential impact.
Explore CDN-based techniques for detecting and mitigating credential abuse vulnerabilities, enhancing security protection during request flow without relying solely on origin servers.
Automatic approach to heap layout optimisation for exploitation using pseudo-random search over allocator interactions, with applications to real-world programs and vulnerability targeting.
Explore Z-Wave network vulnerabilities using auto-discovery and backup/restore features, demonstrating potential security risks in smart home systems.
Demystifying SamsungPay's implementation and security mechanisms, with insights on bypassing analysis obstacles. Explore the intricacies of this mobile payment service's architecture and potential vulnerabilities.
Explore vulnerabilities in HSTS implementation across major browsers, focusing on undocumented aspects and potential security risks in Firefox, IE/Edge, and Chrome.
Explore SHA-3 and SHAKE algorithms, their applications in cryptographic protocols, and the evolution of secure communication methods in this comprehensive technical overview.
Explore tools and methods for public mind manipulation, examining historical research and analyzing Twitter posts to reveal how malefactors exploit social events to promote their agendas.
Explore critical iOS kernel vulnerabilities, privilege escalation techniques, and mitigation bypasses in this in-depth analysis of unexplored areas affecting millions of devices.
Explore cyber diplomacy, international partnerships, and the evolving landscape of cybersecurity in a globalized world. Learn strategies for alliance-building and advancing cooperation in cyberspace.
Explore the first public Apple Watch jailbreak, delving into watchOS internals and security aspects for iOS-based devices.
Explore trust-enabled botnets and defense strategies in this talk on P2P botnet resilience, monitoring techniques, and the Sality botnet, with insights on crawler and sensor effectiveness.
Uncover hidden vulnerabilities in programming languages through differential fuzzing. Learn to identify undocumented functions, exposed sensitive data, unexpected code execution, and potential security risks.
Get personalized course recommendations, track subjects and courses with reminders, and more.