Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques to bypass MacOS privacy mechanisms, including vulnerabilities in TCC framework, code injections, and system tool abuse. Compare security improvements between Monterey and Big Sur.
Insightful discussion on pressing InfoSec issues and future strategies, featuring key takeaways from Black Hat Europe 2022 with industry experts Jeff Moss, Jiska Classen, Federico Maggi, Leigh-Anne Galloway, and Anant Shrivastava.
Explore vulnerabilities in drone remote control systems, focusing on proprietary protocols and their security implications. Learn about potential risks and the importance of open design principles in drone technology.
Explore Layer 2 Discovery Protocol vulnerabilities in enterprise devices, uncovering neglected attack surfaces and analyzing recent research to improve network security.
Uncover innovative kernel exploit techniques using limited primitives, focusing on turning seemingly benign bugs into powerful attack vectors for code execution and privilege escalation.
Uncovers security vulnerabilities in IoT access control policies on cloud platforms, revealing design flaws and deployment issues that pose risks for manufacturers and users.
Explore AD FS attacks, detections, and mitigations for Azure AD security. Learn about identity federation vulnerabilities and strategies to protect cloud-based resources from unauthorized access.
Explore security risks in SQL databases with JSON features. Learn about potential vulnerabilities and hacking techniques for JSON-based queries in major database engines.
Unveiling vulnerabilities in Microsoft Defender for Office 365's Safe Attachments and Safe Links features, exposing potential evasion techniques and security implications for organizations.
Uncover critical cryptographic vulnerabilities in Matrix's federated communication standard, compromising confidentiality and authentication claims against malicious servers.
Discover Pspray, a novel Linux kernel exploitation technique enhancing reliability for targeted attacks. Learn about its effectiveness across various memory vulnerabilities and its impact on cybersecurity.
Comprehensive overview of UK cybersecurity policy priorities, initiatives, and development process. Learn how to influence outcomes and engage with government efforts in this field.
Explores static code analysis techniques for vulnerability detection in binary code, focusing on pattern extraction and efficient searching across large codebases, with practical examples.
Explore vulnerabilities in modern CNC machines, including network security risks, code leaks, and potential for sabotage. Learn about countermeasures to protect critical industrial assets.
Explore a blind VCC glitching technique to bypass secure boot mechanisms on mobile SoCs, demonstrated on Qualcomm MSM8916/APQ8016. Learn practical application and see a live demo of this effective method.
Get personalized course recommendations, track subjects and courses with reminders, and more.