Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in inter-process communication (IPC) systems, including network sockets, Windows named pipes, and USB devices. Learn about potential attacks and mitigation strategies.
Explore techniques for bypassing anti-DDoS measures using older technologies, focusing on UDP data analysis, intelligence gathering, and protocol effectiveness.
Explore SS7 vulnerabilities and Trojan attacks that bypass security measures, focusing on signal messages, numbering plans, and location tracking in mobile networks.
Explore the security vulnerabilities of fax technology, including debugging challenges, attack vectors, and mitigation strategies in this comprehensive analysis.
Explore the evolution and tactics of "The Snake" malware, including infection vectors, lateral movement, and backdoor mechanisms in this cybersecurity analysis.
Explore real-world threat intelligence in activism, emergency response, and political adversaries. Learn to diagnose problems, develop treatment plans, and understand various security threats.
Explore TheHive and MISP integration for enhanced threat intelligence sharing, analysis, and incident response capabilities in cybersecurity operations.
Explore Adobe Flash sandbox vulnerabilities, focusing on input validation flaws in file path handling. Learn about local and remote sandbox escapes, their implications, and broader security considerations.
Explore a framework for detecting threats in telecom networks, covering monitoring, data collection, and analytics to protect infrastructure and subscribers from various attacks and privacy issues.
Explore vulnerability disclosure's evolution, its impact on policy-making, and the role of governments. Learn about bug bounties, legal considerations, and international efforts in cybersecurity.
Guidance for development teams on implementing effective security strategies, covering risk assessment, compliance, staffing, and integrating security into organizational culture and processes.
Explore techniques for exploiting notorious Remote Administration Tools used in targeted attacks, turning the tables on sophisticated adversaries and exposing vulnerabilities in their command and control systems.
Explore social media's impact on information flow, opinion formation, and real-world events. Analyze case studies of online campaigns and their consequences across different regions and contexts.
Explore the maximum potential of IPv4 for Reflected Distributed Denial of Service attacks, including calculation methods, data visualization, and implications for DDoS mitigation strategies.
Explore cryptographic API design, focusing on NaCl and libsodium. Learn about challenges, best practices, and future trends in creating secure and user-friendly cryptographic libraries.
Get personalized course recommendations, track subjects and courses with reminders, and more.