Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for intercepting and decrypting encrypted SIP sessions, and learn about a new tool for streamlined password recovery in VOIP protocols.
Explore covert Bluetooth communication using Ghost Tunnel 2.0, enabling multiple secure tunnels for file transfer and command execution without detection or inspection by most protection systems.
Exploring the creation of a new EU-endorsed bug bounty platform, focusing on international collaboration, security standards, and benefits for both hunters and companies.
Explore PatrOwl, an innovative solution for automating cybersecurity tasks. Learn how it integrates various tools, analyzes results, and predicts attack scenarios to enhance SOC efficiency and address the cybersecurity talent shortage.
Explore a covert distributed chat system using 802.11 management frames, featuring AES encryption, extended network coverage, and data exfiltration capabilities for secure communications.
A quantitative study of 2000+ infosec tools from the past decade, analyzing their evolution and providing insights on creating effective cybersecurity tools.
Presentation on a secure, scalable framework for anomaly-based network intrusion detection, implemented in Go. Explores feature extraction, data collection, and machine learning applications for detecting network threats.
Reverse engineering custom chips in SCADA systems using leaked boards, identifying interfaces, and creating debug setups for vulnerability discovery in industrial PLCs.
Explore live malware reversing techniques for Windows and Android, focusing on methodology and essential tools for identifying and analyzing malicious software samples.
Explore vulnerabilities in VoLTE implementations, including text spoofing and subscriber enumeration. Learn to monitor VoLTE traffic on rooted Android phones using custom tools and Wireshark.
Exploring the 0day vulnerability market's inefficiencies and Crowdfense's innovative approach to improve standards, processes, and outcomes for all stakeholders in the cybersecurity ecosystem.
Explore Java serialization exploit development, including 0day custom exploits, reverse engineering, and ROP techniques. Learn to break HMAC/MAC and create Python exploits for educational purposes.
Explore machine learning techniques for investigating large-scale web campaigns, enhancing cybersecurity analysis and threat detection capabilities.
Explore the evolving landscape of cyber warfare and its global implications with renowned security expert Mikko Hypponen in this thought-provoking keynote address.
Explore blind digital signatures, their applications in privacy-preserving technologies, and potential impacts on cybersecurity with experts Dr. Abu Talib and Dr. Nasir.
Get personalized course recommendations, track subjects and courses with reminders, and more.