Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover groundbreaking techniques for decrypting DPAPI-protected data and SID-protected PFX files, revealing potential vulnerabilities in Windows systems and enterprise security.
Explore vulnerabilities in KNX automation systems for smart buildings. Learn how intruders can exploit weaknesses to conduct attacks, manipulate configurations, and compromise entire networks.
Introduction to firmware reverse engineering for IoT devices, focusing on information gathering, emulation environment setup, and analysis techniques. Includes a practical example using a home router.
Exploring hardware hacking failures during RHme3 CTF challenge: building rigs, writing code, and overcoming obstacles. Insights on learning from setbacks in cybersecurity competitions.
Explore machine learning for offensive research: automate crash analysis, determine exploitability, and accelerate bug triage. Discover AI-driven techniques to enhance vulnerability detection and exploitation processes.
Explore mimikatz's capabilities beyond credential collection, understand its power, and learn detection strategies for this persistent post-exploitation tool.
Exploring vulnerabilities in NFC payment systems, focusing on relay and replay attacks. Discusses security challenges and potential bypasses of tokenization in digital transactions.
Explore advanced WMI lateral movement techniques beyond Win32_Process, expanding the arsenal for threat actors and enhancing defensive strategies against sophisticated attacks.
Exploring advanced HID attack techniques using WHID Injector and P4wnP1, including design insights, feature comparisons, and defensive strategies for Blue Teams to detect and mitigate these sophisticated threats.
Evolution of enterprise security: from traditional methods to automated attacks. Explores sophisticated tactics, tools, and techniques reshaping Active Directory vulnerabilities and domain privilege escalation.
Explore advanced car backdoor techniques using "The Bicho," surpassing Bluetooth limitations for enhanced attack range and effectiveness in connected vehicle security.
Explore PBX vulnerabilities, their impact, and mitigation strategies. Learn about potential security threats and how to protect against them in various PBX systems.
Explore AI, machine learning, and deep learning in cybersecurity through a lively debate. Experts discuss vendor claims, organizational readiness, and future implications, inviting audience participation.
Practical techniques for integrating security into existing software development methodologies, addressing deficiencies, and ensuring compliance throughout the SDLC.
Explore advanced CMD obfuscation techniques used by threat actors, including string manipulation and encoding methods. Learn about new obfuscation approaches and their detection implications for cybersecurity professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.