Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Descubre técnicas para identificar activos en la nube y cazar vulnerabilidades en programas de recompensas, con ejemplos prácticos y herramientas útiles.
Explora los riesgos de seguridad en dispositivos inteligentes, analizando su código fuente, tráfico de red y configuraciones inseguras para tomar decisiones informadas sobre su uso.
Técnicas y herramientas de Red Teaming en entornos industriales, incluyendo ataques remotos, phishing y fÃsicos. Análisis de anatomÃa de ataques y estrategias de cifrado para evaluar la seguridad empresarial.
Explora técnicas de ingenierÃa social y phishing lateral, analizando casos reales y estrategias defensivas para mejorar la seguridad en entornos empresariales.
Descubre cómo la curiosidad por la consola Intellivision llevó a la creación de herramientas y juegos, revitalizando una comunidad de desarrolladores y entusiastas de la programación retro.
Explore modern Secure Boot attacks, focusing on bypassing Intel Boot Guard in enterprise systems. Learn about hardware Root of Trust, Embedded Controllers, and UEFI Firmware vulnerabilities.
Explore macOS security vulnerabilities and bypasses with Patrick Wardle, focusing on synthetic events and code-signing flaws. Learn about potential risks and defensive strategies for Mac users.
Explore the evolution of advanced threats and defensive software, focusing on persistent methods at hardware and firmware levels. Gain insights into modern security gaps and potential solutions.
Exploración técnica de vulnerabilidades en Cisco IOS, incluyendo bypass de DEP, ROPing, shellcode en etapas y evasión de mecanismos de integridad. Incluye demostraciones prácticas y código fuente.
Innovative approaches to botnet construction using network protocols and technologies, exploring SNMP, DNS, HTTP, and other methods for communication and control.
Explore RFID vulnerabilities in MIFARE Classic cards, focusing on public transport systems. Learn about attack methods, countermeasures, and real-world implications for security professionals.
Reverse-engineering and exploiting a hardened MSP430 device: techniques for firmware extraction, analysis, and data retrieval from RAM, with focus on overcoming JTAG security measures.
Explore security vulnerabilities in DVB-C networks, including middleware server attacks, protocol bugs, and MPEG stream fuzzing. Learn to hijack TV streams and manipulate cable broadcasting systems.
Experiencias y anécdotas sobre descubrimiento de vulnerabilidades, divulgación responsable y aspectos éticos en la seguridad informática.
Explore advanced Windows privilege escalation techniques and token manipulation vulnerabilities with security expert Cesar Cerrudo in this in-depth conference presentation.
Get personalized course recommendations, track subjects and courses with reminders, and more.