Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Docker API vulnerabilities leading to remote code execution, same-origin bypass, and hypervisor persistence via shadow containers. Gain insights into containerization security risks and mitigation strategies.
Explore trust relationships in business, analyzing vulnerabilities and exploitation techniques. Learn to identify, manage, and secure critical trust points in code, platforms, and organizational structures.
Explores vulnerabilities in autonomic networks, focusing on Cisco's "Plug and Play" routers. Analyzes protocols and potential security risks in automated network systems.
Explore notorious command and control toolkits used in targeted attacks, learn about their vulnerabilities, and discover techniques to exploit and defend against these sophisticated threats.
Explore potential security risks of Office365 adoption and learn how malicious actors can exploit these vulnerabilities for covert command and control using PowerShell in enterprise environments.
Explore vulnerabilities in industrial robots, their embedded controllers, and network connections. Learn about potential security risks in modern factory automation systems.
Explores limitations of current cybersecurity awareness training and proposes innovative solutions to enhance effectiveness against spear phishing and other cyber threats.
Discover vulnerabilities in network printers and learn how to exploit them for unauthorized access to confidential data in corporate environments.
Explore kernel memory disclosure detection using x86 emulation and taint tracking. Learn about buffer overflows, memory corruption, and user-mode client interactions in kernel-mode systems.
Explore the creation of the first SHA-1 collision, its implications for hash security, and the challenges faced in developing a meaningful payload and scaling computation.
Insider insights into Black Hat's network operations: statistics, anecdotes, and revelations from the Network Operations Center team's annual debrief.
Explore vulnerabilities in building automation systems, their potential for exploitation, and the implications for physical security in modern infrastructure.
Explore Active Directory DACL backdoors, their offensive potential, and stealth techniques. Learn about control relationships, elevation paths, and persistence methods in AD objects.
Explore hidden attack surfaces in modern web infrastructure, focusing on transparent systems for performance and analytics. Learn to identify and exploit overlooked vulnerabilities.
Facebook CSO Alex Stamos discusses the evolving role of cybersecurity, emphasizing the need for a renewed focus on defense and making security accessible to all in an era of heightened digital risks and societal impact.
Get personalized course recommendations, track subjects and courses with reminders, and more.