Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore API security challenges in microservices architectures and learn strategies for distributed security, including gateways, service mesh, authentication, and network segmentation.
Explore vulnerabilities in Building Management Systems, their impact on critical facilities, and the research process behind discovering these security flaws in various BMS components and products.
Detailed analysis of vulnerabilities in Siemens SIMATIC PLC protection mechanisms, including hacking methods and security recommendations for various models. Essential for industrial control system security professionals.
Explore blockchain technology as a cutting-edge defense mechanism in cybersecurity, examining its potential applications and impact on digital security strategies.
Explore critical security vulnerabilities in DICOM servers, protocols, and libraries used in medical imaging systems. Learn to identify and fix bugs in the DICOM ecosystem.
Explore Android app vulnerability detection through a novel OS with MRI-like functionality, enabling non-invasive code analysis and data flow tracing for enhanced mobile security.
Explore GPTHound, an AI-powered tool enhancing Active Directory security assessments. Learn how it simplifies query generation, asset classification, sensitive information detection, and attack path analysis across multiple languages.
Explore Scarlet OT, an open-source tool for ICS security testing. Learn about OT adversary emulation, protocol support, and real-world applications in industrial environments.
Unveiling a critical VoLTE vulnerability in iOS devices, exploring its technical details, impact on user privacy, and Apple's response to this long-standing security flaw in 4G implementation.
Exploring systems thinking in hacking, this keynote reveals how understanding complex systems creates new opportunities to manipulate critical infrastructure and the fabric of cyberspace.
Explore Windows kernel exploitation through analysis of two Pwn2Own exploits. Learn about vulnerability discovery, exploit development, and evolving kernel mitigations in this deep dive into advanced Windows security research.
Unveiling critical vulnerabilities in SAP Start Service, from local to remote exploits. Explores memory corruption and OS command injection leading to root-level RCE, with live demo and recommendations.
Exploring pre-auth remote vulnerabilities in NVMe implementation, emphasizing the importance of SCA tools in production pipelines and showcasing discoveries in Linux kernel and NVIDIA.
Explore Amazon Cognito security misconfigurations, learn testing techniques for audits and bug bounty hunting, and discover mitigation strategies through a real-world account takeover case study.
Exploring critical vulnerabilities in residential and commercial power control systems, highlighting potential catastrophic risks and novel attack scenarios in the energy sector.
Get personalized course recommendations, track subjects and courses with reminders, and more.