Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring the impact of everyday security threats on ordinary people and advocating for user empowerment to build a safer internet through knowledge sharing and community support.
Exploración de la evolución de ataques y defensas en ciberseguridad, abogando por un cambio hacia estrategias de defensa proactivas y basadas en inteligencia para superar las limitaciones de los enfoques reactivos actuales.
Automate exploit generation and JavaScript analysis with WinDBG. Learn techniques for creating exploits from PoC crashes and tracking obfuscated JavaScript without triggering anti-debugging measures.
Explore the Metabrik Platform for rapid security tool development. Learn to create reusable components, improve existing tools, and solve complex security challenges efficiently.
Explore autonomous hacking with Mechanical Phish, a system for automatic bug detection, exploit creation, and binary patching. Learn about its design, challenges, and implementation in the DARPA Cyber Grand Challenge.
Unveiling the sophisticated attack chain of Russian-speaking cybercriminals, detailing their infrastructure, techniques, and resources accumulated since 2007, including billions of compromised emails and millions of infected servers.
Unveiling vulnerabilities in HID Global Soft Token's Android app, exploring cryptographic weaknesses that could allow attackers to clone configurations and potentially discover user PINs through brute force.
Exploring the world of 'booter' services: their users, providers, and impact on online gaming. Insights into cybercrime pathways and the motivations behind denial of service attacks.
Explore handling security requirements throughout software development, covering scalability, use cases, and practical demonstrations with insights on data protection and integration.
Explore Android security techniques for safeguarding secrets, from authentication to key management. Learn practical approaches to enhance app security and protect sensitive data.
Learn strategies for scaling MISP using cloud technologies to enhance threat intelligence sharing and improve cybersecurity operations in large-scale environments.
Explore advancements in atomic threat coverage, including new architecture and mitigation strategies. Gain insights into ongoing work and discuss innovative ideas in cybersecurity.
Explore the synergy between EclecticIQ Platform and MISP for enhanced threat intelligence sharing, automated analysis, and streamlined incident response workflows.
Explore efficient data storage and retrieval techniques for large-scale threat intelligence using Sighting, focusing on performance optimization and integration strategies.
Explore techniques for exploiting Bash on Windows, including remote shells, password extraction, and AppLocker bypasses. Learn about security implications and forensic considerations.
Get personalized course recommendations, track subjects and courses with reminders, and more.