Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore power grid vulnerabilities, live demo of feeder relay exploitation, and mitigation strategies. Learn about securing critical infrastructure and the responsible disclosure process.
Exploring JavaScript's unique features and how they lead to vulnerabilities in various software, including Flash, Chrome, Edge, and Safari. Insights for developers and security researchers.
Explore techniques for leaking and bypassing antivirus detection models, including APK perturbation, model leaking, and auto-bypassing processes. Gain insights into commercial AV weaknesses.
Explore the rise of firmware vulnerabilities in recent years, their impact on system security, and the challenges in mitigating these threats in BIOS/UEFI environments.
Explore the impact of The Shadow Brokers' leaks on cybersecurity, examining sophisticated nation-state tools and the evolving landscape of cyber fear as a geopolitical instrument.
Discover a formal method for detecting protocol implementation vulnerabilities in closed-source network devices, focusing on OSPF in routers, without accessing source code or binaries.
Explore innovative attack vectors in industrial control systems, focusing on exploiting physical processes to bypass security measures and deliver malicious payloads.
Explore attack surfaces of hypervisors and TrustZone monitors in ARM-based phones, focusing on Google Nexus and Pixel devices. Learn about attack scenarios and interactions between privilege levels.
Comprehensive analysis of Electron's security model, isolation mechanisms, and vulnerabilities in Electron-based applications. Explores IPC messaging, preloading, and design weaknesses.
Explore strategies for influencing security stakeholders through cyber wargaming, including technical architecture, business value, and lessons learned from real-world implementations.
Explore rVMI, a powerful platform combining VMI and Rekall for interactive malware analysis, operating from the hypervisor with advanced event control capabilities.
Explore a novel SSRF exploit technique targeting URL parsers in popular programming languages. Learn about vulnerabilities in Python, PHP, Java, and more, uncovering inconsistencies between parsing and requesting.
Explore realistic adversary simulations and organizational responses through purple team exercises to enhance SOC and IR team effectiveness and maturity.
Explore the security implications and threat model of serving third-party JavaScript across the web, with insights for startups building enterprise products.
Explore MQTT protocol vulnerabilities, SQL database attacks, and new device discoveries. Assess current security landscape and global response to previous findings in IoT and connected systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.