Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore satellite communication vulnerabilities and cutting-edge security strategies to protect space-based assets from cyber threats, jamming, spoofing, and data interception.
Strategies for maximizing threat intelligence to enhance cybersecurity defenses, focusing on creative approaches to generate and apply intelligence for breakthrough discoveries in attack detection.
Explore advanced web race condition attacks, targeting state machines to forge data, misroute tokens, and hide backdoors. Learn efficient testing methods and precision tooling for exploiting vulnerabilities in high-profile websites.
Discover techniques for analyzing and exploiting Mitsubishi PLC protocols without firmware access. Learn about protocol reconstruction, vulnerability discovery, and their impact on industrial systems.
Detailed exploration of UPI security vulnerabilities, including payment flows, threat modeling, and a major vulnerability disclosure. Offers insights into reversing and debugging UPI applications.
Explore reverse engineering Windows RGB keyboard drivers and implementing Linux kernel drivers for HP laptops. Learn techniques for dotnet/Windows apps and contributing to the Linux kernel.
Expert panel discussion on cyber operations, doctrine, and geopolitics, exploring the intersection of cybersecurity, international relations, and strategic policy in the digital age.
Explore vulnerabilities in peripheral drivers, including a 0day discovery, exploitation techniques, and mitigation strategies. Learn about common security risks and how to protect your system.
Exploration des vulnérabilités des contrôleurs d'accès réseau, en particulier Alcasar. Analyse des failles de sécurité et des moyens de contournement, avec focus sur l'authentification et la protection des mots de passe.
Explore vulnerabilities in smart cloud-based intercoms, including remote code execution and unauthorized access to video streams. Learn about VOIP protocols and security implications in modern intercom systems.
Expert panel discusses key components of effective cybersecurity strategies, offering insights on comprehensive approaches to protect organizations from evolving threats and vulnerabilities.
Uncover how gaming keyboard software can lead to kernel vulnerabilities, exploring real-world exploits and discussing future implications for Linux kernel security.
Explore buffer overflow vulnerabilities in exception handling, uncovering a new exploitation technique and its real-world implications for software security.
Expert panel discusses challenges and strategies for securing autonomous vehicles, addressing cybersecurity risks and safety concerns in the evolving automotive industry.
Explore secure remote operations, analyzing pros and cons of jump server architectures, role-based shells, and PowerShell limitations. Includes new research on full token hijacking from network logon sessions without hashes or TGTs.
Get personalized course recommendations, track subjects and courses with reminders, and more.