Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Management & Leadership
Cybersecurity
Digital Marketing
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Uncommon Sense Teaching
Programming for Everybody (Getting Started with Python)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Evaluating SAST tools: Learn how to assess their effectiveness in finding real vulnerabilities using synthetic test suites and practical examples of CVEs.
Explore how new security measures in Chrome can be exploited to bypass the sandbox and compromise user privacy, revealing potential vulnerabilities in browser protection mechanisms.
Explore graph convolutional networks for detecting suspicious communication pairs in industrial control systems, enhancing security monitoring beyond traditional whitelisting methods.
Explore IKEv2 attack surface through header chaining, uncovering vulnerabilities in IPsec VPNs. Learn techniques for identifying and exploiting weaknesses in Internet Key Exchange implementations.
Practical exploration of fingerprint authorization vulnerabilities in Android apps, demonstrating attack techniques and suggesting mitigation strategies for developers.
Explore how lasers can manipulate voice-activated IoT devices, revealing potential security vulnerabilities in smart home technology and microphone systems.
Explore security vulnerabilities in app-in-app paradigms for Android and iOS, focusing on mini-programs' design flaws and potential risks to user privacy and data protection.
Explore SSD data recovery techniques, uncovering hidden management methods and confidential controller information to maximize chances of retrieving lost data from solid-state drives.
Explore quantum cryptography beyond basic qubit exchange, delving into exotic applications and quantum effects for securing information that traditional cryptography cannot achieve.
Explore new timing attacks for hypervisor detection, crucial for sandbox evasion in malware analysis. Learn about hardware-assisted virtualization vulnerabilities and low-level measurement techniques.
Explore the evolving sophistication of ransomware operations, focusing on European targets, attack strategies, and the lifecycle of Rival ransomware. Learn about emerging trends and future threats in cybersecurity.
Unveils a novel attack exploiting PCIe bus vulnerabilities to reconstruct DNN models in AI privatization scenarios, discussing challenges, techniques, and countermeasures.
Unveiling critical zero-day vulnerabilities in layer 2 protocols, demonstrating their impact on enterprise device and network security, and exploring potential exploitation techniques.
Explore Windows Event Log for efficient adversary detection, leveraging automation and MITRE ATT&CK framework to enhance cybersecurity monitoring and response capabilities.
Insightful discussion on pressing InfoSec issues, including COVID-19 impact, security breaches, misinformation, and digital asset protection, featuring Black Hat Review Board members.
Get personalized course recommendations, track subjects and courses with reminders, and more.