Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore lesser-known smart contract vulnerabilities, bad coding patterns, and defensive strategies. Learn to identify and protect against overlooked attack vectors in blockchain security.
Expert panel explores diverse aspects of critical infrastructure beyond power systems, discussing cybersecurity challenges and resilience strategies for essential services and networks.
Discover the benefits of creating custom security tools for research. Learn how this approach enhances understanding, improves vulnerability detection, and ultimately makes you a more effective security researcher.
Explore Android's vulnerability to Dirty Stream Attacks, where malicious apps exploit file-sharing intents to compromise target applications. Learn detection methods and security measures.
Explore integrating side-channel regression testing into CI development, with practical demonstrations and insights on implementing countermeasures for sample attacks.
Innovative techniques for detecting server-side prototype pollution without causing DoS, including a Burp extension for blackbox testing and identifying JavaScript engines through crafted requests.
Insights into tackling cybercrime targeting fintech platforms in India, exploring hacking techniques, law enforcement challenges, and potential countermeasures to protect the digital economy.
Explore the challenges and solutions in writing secure smart contracts for Web 3.0, including preventing sensitive information leaks and deploying to decentralized servers.
Explore DICOM file vulnerabilities in healthcare and learn about an entropy-based detection technique to identify malicious files, with demonstrations of attacks and protective solutions for Linux and Windows.
Explore Android foreground services vulnerabilities, including a race condition bug and its patch bypass, demonstrating potential escalation of privileges and security implications.
Exploración detallada del jailbreak en iOS, abordando desafÃos de seguridad, técnicas de bypass y evolución de las medidas de Apple. Análisis profundo de sandbox, firma de código y mitigaciones de hardware/software.
Expert panel discusses strategies and challenges in software security, offering insights for industry professionals and organizations to enhance their cybersecurity practices.
Learn to automate WhatsApp chats on Android using Accessibility Services. Discover how to create a sample app, explore potential security risks, and gain insights into automating various Android functions.
Comprehensive guide to macOS security vulnerabilities, including live demonstration of 0-day exploit, post-exploitation techniques, and hardening recommendations for Mac infrastructures.
Panel discussion on optimizing Security Operations Centers (SOCs), covering best practices, challenges, and innovative approaches to enhance cybersecurity monitoring and response capabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.