Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Ingeniera de seguridad y privacidad comparte su experiencia en roles de liderazgo en Notion, Lyft, Apple y Microsoft, abordando desafÃos y tendencias en la industria tecnológica.
Descubre vulnerabilidades crÃticas en routers OEM y sus implicaciones para la seguridad. Análisis detallado de un caso de estudio que revela fallos en la cadena de suministro y prácticas de seguridad deficientes.
Explora el fascinante mundo del control de satélites espaciales utilizando Python, abordando desafÃos técnicos y aplicaciones prácticas en la industria aeroespacial moderna.
Explore fileless attacks in containers, their detection using eBPF tools, and implications for cloud-native security. Learn about this growing threat and defense strategies from an expert developer.
Cybersecurity expert shares harrowing experience of wrongful imprisonment, highlighting flaws in Uruguay's judicial system and the need for fair cybercrime prosecution processes globally.
Explore a new Spectre v2 technique to bypass ASLR on Intel CPUs by abusing branch predictors, with demos on x86 internals, side-channel attacks, and speculative execution.
Explore the misuse of Apple AirTags for tracking, examining detection challenges, potential risks, and implications for privacy and security in interconnected device networks.
Exploración de vulnerabilidades crÃticas en el servidor HTTP de SAP, demostrando técnicas de explotación de alto nivel para comprometer sistemas SAP sin autenticación.
Explore real-world attack obfuscation techniques used against top global Internet companies and learn how to develop better defenses by observing adversary tactics.
Explore load balancer architecture, operation, and deployment. Learn post-breach access, avoiding detection, and implementing persistent implants. Valuable for both offensive operations and defensive strategies.
Exploración de ingenierÃa inversa en MAME: análisis forense, hardware y emulación de plataformas. Perspectivas de un desarrollador veterano sobre preservación digital y arqueologÃa tecnológica.
Análisis del ciberespionaje en América Latina: grupos activos, operaciones encubiertas y falta de incentivos para su investigación por parte de compañÃas de ciberinteligencia.
Aprende ingenierÃa inversa y desarrollo de trucos para videojuegos a través de la experiencia de un experto en seguridad, utilizando el MMORPG Rakion como ejemplo práctico.
Explore Azure backdoor techniques, their mechanics, and detection methods. Learn to identify stealthy attacker tactics and prepare for future threats in cloud environments.
Innovative anti-phishing Firefox plugin using image comparison to detect cloned websites. Explores challenges, implementation, and discussions around this new approach to cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.