Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced hacking techniques using Microsoft-signed tools, including PowerShell and debuggers, to achieve various attacks and persistence on Windows systems.
Explore techniques to bypass Control Flow Guard in Windows using big data analysis, focusing on unguarded gates and indirect branches for enhanced security understanding.
Insights on designing and securing enterprise networks under constraints, drawing from Black Hat's network experiences. Covers evolution, challenges, and future directions in network management.
Explore cryptographic secret handshakes for mobile devices using Bluetooth LE, enabling mutual authentication between untrusted parties in virtual secret communities.
Explore advanced techniques to mitigate BREACH attacks in web applications using compression and encryption. Learn about Context Hiding and its implementation in practical scenarios.
Explores Linux BPF JIT compiler vulnerabilities, demonstrating how randomization fails to prevent JIT spray attacks and proposing mitigations for enhanced kernel security.
Explore Kerberos delegation vulnerabilities in Windows networks, learning techniques for unauthorized impersonation and remote code execution. Gain insights into potential security risks and mitigation strategies.
Explore security unit testing for custom code, focusing on inoculating applications, identifying endpoints, and addressing common vulnerabilities through automated testing frameworks.
Explores DoS attacks on 4G cellular networks, revealing vulnerabilities in mobile communication systems and their potential for user tracking and manipulation. Discusses implications for security and privacy in telecommunications.
Explore data integrity attacks in industrial control systems, focusing on attacker perspectives and strategies for unauthorized access to control networks and equipment.
Explore a portable virtual device fuzzing framework using AFL to enhance VM security. Learn techniques for identifying vulnerabilities in virtual devices and preventing VM escape attacks.
Insightful discussion on critical InfoSec trends and their impact on future strategies, featuring industry experts at Black Hat Europe 2016's closing session.
Explore vulnerabilities in OAuth2.0 protocol when used for mobile app authentication, uncovering potential security risks in Single-Sign-On services for billions of users.
Explore fine-grained Control-Flow Integrity for Linux kernel security, addressing ROP attacks and dynamic kernel modules. Learn advanced mitigation techniques and implementation challenges.
Explore USB/IP vulnerabilities in Linux, including buffer overflow and data injection. Learn about architecture, protocol, and security implications of this USB device sharing framework.
Get personalized course recommendations, track subjects and courses with reminders, and more.