Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore key cybersecurity insights from Black Hat Asia 2017, covering topics like attacker specialization, machine learning, digital nations, and biometrics.
Explore deep learning-based antivirus technology with low false positive and negative rates, already in production since 2016. Learn about AI's potential to revolutionize cybersecurity.
Explore PDF vulnerabilities, efficient fuzzing techniques, and attack surface analysis to uncover 100+ CVEs in a year, with statistical insights on security weaknesses.
Explore SafeStack's vulnerabilities and potential bypasses in Clang compiler, analyzing implementation weaknesses and demonstrating practical exploitation techniques for memory corruption.
Explore new attacks on HTTP/2, the emerging Internet protocol. Learn about vulnerabilities, implementation flaws, and potential mitigations in this cutting-edge cybersecurity analysis.
Explore Android plugin technology's security risks and learn defensive strategies to protect your app from unauthorized loading and execution as a plugin.
Explore techniques to bypass ASLR, DEP, and CFG exploit mitigations in Microsoft Edge on Windows 10, even with arbitrary address read/write capabilities.
Explore IoT security vulnerabilities, bug hunting techniques, and exploit methods. Learn to identify and address risks in everyday connected devices for improved cybersecurity.
Learn offensive techniques to enhance your organization's cyber defense against advanced, targeted attacks from security experts Itai Grady and Tal Be'ery.
Explore techniques for auditing and bypassing Web Application Firewalls using automata learning, with a focus on code injection attacks and grammar-oriented filter auditing.
Explore how attackers can exploit Rowhammer vulnerabilities to compromise VM isolation, demonstrating practical attacks on OpenSSH and discussing implications for cloud security.
Explore Android rooting techniques, from kernel vulnerabilities to exploitation, addressing challenges like SELinux enforcement and limited attack surfaces in modern devices.
Explore innovative web scanning techniques to detect unknown injection vulnerabilities, moving beyond traditional payload-based methods for more comprehensive security testing.
Visualizing online counterfeiting networks through passive DNS analysis, revealing cybercriminal strategies and providing insights for law enforcement to combat digital fraud.
Explore control-flow integrity implementation challenges, focusing on security and practicality. Learn about code-reuse attacks, randomization, and hardware-based solutions for robust CFI.
Get personalized course recommendations, track subjects and courses with reminders, and more.