Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced cmd.exe obfuscation techniques, including carets, quotes, and stdin argument hiding. Learn complex methods like string manipulation and novel encoding approaches for enhanced command-line security.
Debunking endpoint security buzzwords and hype. Practical insights on evaluating solutions beyond marketing claims, focusing on real-world effectiveness and meaningful metrics.
Explore remote exploitation techniques for Intel Management Engine, affecting most Intel-based systems since 2010. Learn about vulnerabilities and potential security risks in this critical subsystem.
Exploit chain to defeat Samsung KNOX security from zero privilege, bypassing KASLR, DFI, SELinux, and escalating privileges. Detailed vulnerabilities and mitigation bypassing techniques revealed.
Explore power law-based techniques for detecting and mitigating DDoS attacks, intrusions, and other malicious network activities using PEIMA methodology.
Explore automated RF signal identification techniques for monitoring diverse wireless technologies in organizational environments, enhancing security and management capabilities.
Bedtime story-style guide for cybersecurity professionals on conducting threat hunts. Covers five essential hunts to find bad actors and improve organizational security.
Explore the Hourglass Model 2.0 framework for gathering security intelligence on underground marketplaces, focusing on 2FA abuse in Southeast Asia and its implications for threat prevention.
Unveiling recent APT campaigns targeting financial institutions, including banks, ATM companies, and Bitcoin exchanges, with insights on malware, vulnerabilities, and attack vectors.
Uncover a chosen-plaintext attack on Windows authentication, exploiting a vulnerability in common protocols. Learn about the attack's mechanics, implications for network security, and mitigation strategies.
Explore security challenges and solutions for large-scale datacenter orchestration platforms like Kubernetes, Mesos, and Docker, focusing on cloud-scale infrastructure and software-defined datacenters.
Explore firmware extraction techniques using affordable SD card readers, bypassing expensive tools and complex setups for efficient hardware hacking and analysis.
Explore OpenCrypto, a library enabling full utilization of JavaCard capabilities across vendors. Learn about cryptographic coprocessors and ecosystem advancements in smart card technology.
Innovative file system solution to combat ransomware attacks, offering preventive and reactive security measures beyond traditional detection approaches for enhanced data protection.
Explore the Web Cache Deception attack, a new vector exposing sensitive user data through server and caching manipulation. Learn about risks, conditions, and mitigation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.