Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore generic signatures for log events with Sigma, a YAML-based format for sharing and converting log signatures across different SIEM systems and query languages.
Explore MISP for large-scale malware surveillance, focusing on config extraction, analysis techniques, and practical applications in cybersecurity threat intelligence.
Explore USB security vulnerabilities and the Keynterceptor, a stealthy keyboard implant for capturing and injecting keystrokes, with real-world demonstration and implications.
Explore Intel AMT vulnerabilities and forensics techniques. Learn about potential attacks, mitigations, and non-destructive investigation methods for compromised systems. Gain insights into remote management technology risks.
Explore automated .NET analysis using WinDBG, focusing on PowerShell scripts and .NET packer unpacking. Gain practical insights through live demonstrations and real-world case studies.
Exploring privacy challenges faced by marginalized communities through real stories, highlighting the need for inclusive, safer tools and systems that protect vulnerable individuals.
Explore Snuffleupagus, an open-source PHP security module that kills bug classes, implements virtual-patching, and enhances protection against vulnerabilities without modifying application code.
Exploring real-world cryptographic failures in malware, this talk offers insights into identifying and potentially exploiting these vulnerabilities, with practical examples and a useful triage tool.
Explore WiFi exploitation techniques, from passive interception to active attacks. Learn about device profiling, rogue access points, and MitM attacks. Includes demonstration of a new sensor framework for visualizing 802.11 data.
Explores vulnerabilities in modern building intercoms, demonstrating practical attacks and security risks associated with connected entry systems. Highlights potential backdoors and recommends security measures for M2M solutions.
Explore the intriguing CheshireCat malware family, its unique traits, and stealth tactics. Learn about its decade-long operation, retro coding style, and functional obfuscation techniques.
Explore IoT vulnerabilities, focusing on FTP services in routers and NAS devices. Learn about ScanR framework, malware analysis, and protective measures against these widespread threats.
Explore x86 architecture research, covering CPU privileges, hypervisors, and emerging technologies. Learn to focus on research questions by understanding fundamental architectural concepts.
Explore privilege escalation techniques in large-scale breaches and learn how to identify and combat credential exposure using a comprehensive framework for both offensive and defensive purposes.
Explore vulnerabilities in deep learning systems and learn techniques to manipulate image recognition, speech recognition, and phishing detection through practical demonstrations and attack methodologies.
Get personalized course recommendations, track subjects and courses with reminders, and more.