Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring government demands for backdoor access to encrypted data, examining proposed solutions, and discussing the balance between security and privacy in digital communications.
Unveils a new attack vector against SMBv2, affecting all IE versions. Demonstrates remote credentials theft and user impersonation from the internet, exploiting bugs for complete user compromise without interaction.
Explore the Computer Fraud and Abuse Act through a federal prosecutor's lens. Gain insights into charging decisions, sentencing factors, and balancing security research with law enforcement needs.
Explore Windows kernel token handling vulnerabilities, learn to identify and exploit them for privilege escalation, and understand patterns for conducting security reviews.
Comprehensive methodology for reverse engineering and securing cities' IT infrastructure, exploring vulnerabilities and developing strategies for penetration testing and defense at the urban scale.
Explore vulnerabilities in mobile fingerprint authentication, including authorization attacks, sensor spying, and backdoors. Learn to secure fingerprints and mitigate risks in this eye-opening analysis.
Explore universal Android rooting through kernel exploitation, focusing on a Use-After-Free bug affecting all Linux versions. Learn about innovative techniques for 64-bit devices and bypassing modern kernel mitigations.
Unveiling a critical x86 design flaw allowing privilege escalation, exploring forgotten backdoors, and demonstrating how to exploit vulnerabilities in processor architecture.
Uncover techniques to detect and protect against commercial mobile spyware, safeguarding personal privacy and corporate security in an era of increasing digital surveillance.
Explore vulnerabilities in hypervisors through firmware and hardware emulation, demonstrating attacks and their impacts. Learn about firmware rootkits and new testing modules for hypervisor security.
Detailed exploration of GameOver Zeus botnet, covering its operators, law enforcement investigation, and innovative legal strategies used to dismantle the cybercriminal network.
Explore advanced techniques to combat banking malware, including evasion methods and a novel Zero Knowledge Protocol-based approach for securing client-server communications.
Explore key factors driving Android security using data from millions of devices, establishing a baseline and identifying areas for community focus and research.
Modeling human behavior in network traffic to automatically label security events, using distributed forensic AI for threat detection and response optimization.
Análisis de más de 1.300 muestras de ransomware revela que la mayorÃa no son tan sofisticados como se cree. Se discuten técnicas de detección y prevención, asà como la evolución y caracterÃsticas comunes de diferentes familias de ransomware.
Get personalized course recommendations, track subjects and courses with reminders, and more.