Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore automatic discovery of evasion vulnerabilities in network protocols using targeted fuzzing. Learn about NGFW/IPS traffic inspection, protocol complexities, and strategies to detect and mitigate evasive attacks.
Explore mainframe hacking techniques, from network protocols to buffer overflows, and learn to exploit z/OS vulnerabilities for critical system access.
Comprehensive analysis of Apple's EFI security, examining updates across Mac models and OS versions. Explores EFI update mechanisms and controls, providing insights into Apple's security support practices.
Explore real-world social engineering tactics and defense strategies through an actual bank heist phone call, offering valuable insights for both attackers and defenders in cybersecurity.
Explore SSO vulnerabilities and learn about SVX code verification for safer authentication integrations. Discover real-world applications of SVAuth in web apps.
Unveiling recent operations by North Korean APT groups Lazarus, Bluenoroff, and Andariel, focusing on cyber heists and attacks targeting financial institutions.
Explore passive fingerprinting techniques for HTTP/2 clients, analyzing millions of connections to extract unique user agent fingerprints across various implementations.
Practical approach to enhance DBI tools' stealth and resilience against anti-instrumentation attacks, improving malware analysis and evasion detection techniques.
Explores mathematical backdoors in encryption algorithms, discussing design, detection, and implications for cryptographic trust and control. Examines historical cases and future challenges in algorithm security.
Revealing how VoIP software can leak keystroke information through audio, compromising user privacy. Presents S&T tool to demonstrate vulnerability in popular platforms like Skype and Google Hangouts.
Explore the limitations of Intel SGX Remote Attestation for ensuring confidentiality and integrity of unmodified cloud applications.
Explore how combining SIGINT and HUMINT enhances threat intelligence, providing deeper insights into adversary tactics, intent, and vulnerabilities for improved cybersecurity decision-making.
Explores how data quality impacts machine learning models for malicious URL detection, comparing results across different datasets and analyzing feature activations in neural networks.
Detailed exploration of Tesla's security vulnerabilities, from wireless attacks to CAN bus access, including Tesla's response and new mitigation strategies.
Explore methodologies for quantifying software security risks, predicting vulnerabilities, and evaluating consumer products using the Digital Standard developed by Consumer Reports and CITL.
Get personalized course recommendations, track subjects and courses with reminders, and more.