Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore SAP's HTTP server vulnerabilities and learn advanced exploitation techniques for memory corruption in the Internet Communication Manager, with real-world examples and demonstrations.
Detailed analysis of Industroyer2 malware targeting Ukraine's power grid, comparing it to the original Industroyer and exploring its communication with ICS hardware using industrial protocols.
Explore GitHub Copilot's vulnerabilities in code generation, including SQL injections and buffer overflows. Learn about the risks of AI-generated code and strategies for responsible use in software development.
Explore harm reduction principles in cybersecurity, challenging traditional approaches. Learn pragmatic strategies for effective risk management, reducing costs, and mitigating practitioner burnout.
Systematic analysis of CPU vulnerabilities, exploring root causes and connections between transient-execution attacks and architectural vulnerabilities. Identifies blank spots in CPU security research.
Demonstration of novel downgrade attacks against RPKI, exposing networks to prefix hijacks by disabling RPKI validation through malicious publication points.
Explore a new playbook for major cyber incident investigations, drawing lessons from aviation safety to create actionable insights and build a shared historical narrative in cybersecurity.
Unmasking APT recruitment tactics: Analysis of North Korean and Iranian threat actors using job-themed social engineering to compromise victims, including tradecraft and objectives.
Explore eBPF's evolution in Linux, its expanding capabilities, and its potential for detecting kernel exploits, with insights on probes, challenges, and performance implications.
Explore essential security knowledge for software engineers to build secure systems, addressing common issues and establishing a shared understanding of security principles.
Explore vulnerabilities in network-connected physical access control systems and their potential impact on organizational security, including breach detection and financial consequences.
Explore advanced Spectre attack techniques, focusing on Branch Target Injection and its ability to bypass hardware defenses, with insights on reverse engineering and practical demonstrations.
Explore advanced techniques to bypass endpoint security products using Windows Management Instrumentation, revealing vulnerabilities in SIEMs and EDRs for improved threat detection and mitigation.
Explore psychological tactics to address workplace security vulnerabilities, focusing on staff's reluctance to challenge suspicious individuals and behaviors despite obvious red flags.
Explore vulnerabilities in Graph Neural Networks, including data extraction and model inversion attacks, with insights on protecting proprietary data and models in real-world applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.