Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Hands-on lab exploring Bluetooth Low Energy security vulnerabilities using simulated devices. Learn to assess and exploit common BLE weaknesses without specialized hardware.
Learn to write ARM shellcode for IoT devices, covering ARM architecture, system calls, and techniques for creating compact, reliable payloads. Includes hands-on labs and a demo of exploiting an ARM-based IoT device.
Aprenda a criar e usar um fuzzer para encontrar bugs e vulnerabilidades, incluindo técnicas para escrever exploits e obter acesso a sistemas. Demonstrações práticas incluÃdas.
Explore a physical hardware device for GPS spoofing on non-jailbroken iPhones, offering a flexible and accurate solution beyond traditional app-based methods.
Explore the distinctions between pentesting and red teaming, delving into tools, techniques, and career paths. Gain insights on becoming a red team operator and valuable resources for professional growth.
Explore strategies for enhancing blue team threat detection capabilities, leveraging multiple data sources to stay ahead of sophisticated attackers in an ever-evolving cybersecurity landscape.
Exploring techniques to detect and exploit logical vulnerabilities in web applications, focusing on manual testing methods and real-world examples from bug bounty programs.
Explore how advanced threat actors systematize and scale malware operations, and learn to analyze relationships between campaigns, malware families, and threat actors in this cybersecurity deep dive.
Discover a novel vulnerability in TPM that compromises BitLocker encryption, allowing VMK extraction without physical access. Learn about the sleep mode exploit and its impact on system security.
Discover vulnerabilities in Microsoft 365 applications, including cross-tenant privacy leaks, SQLi, CSRF, SSRF, and XSS. Learn bug hunting techniques and tips for testing new Office 365 features.
Explore AEZAKMI, a tool for browser anonymity and fingerprinting bypass. Learn how it obfuscates common parameters to enhance online privacy and support multi-account usage.
Unveiling iOS 13.7 exploit chain: kernel vulnerabilities, mitigation bypasses, and techniques for reading/writing kernel memory. Insights into iOS security research and jailbreak development.
Explore Android RATs detection using machine learning and Python IDS. Learn about dataset creation, Slips IDS implementation, and live demo of RAT activity detection in mobile device network traffic.
Explore the end-to-end process of automated account takeovers, including attack methodologies, technical innovations, and strategies for capitalizing on ATOs. Learn about UX-centric security measures to combat this growing threat.
Explore AI-powered malware mutation techniques using Generative Adversarial Networks and Deep Reinforcement Learning to create evasive samples, challenging traditional detection methods and enhancing cybersecurity defenses.
Get personalized course recommendations, track subjects and courses with reminders, and more.