Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore API attacks in 4G/5G IoT networks, revealing vulnerabilities and discrepancies between security standards and real-world implementations. Learn about potential threats and defense strategies for mobile IoT infrastructure.
Panel discussion on CERT-IN's notification for reporting security breaches, emphasizing timely incident reporting, organizational awareness, and citizen precautions to enhance India's cybersecurity posture.
Explores advanced fileless malware techniques using Windows event logs for code hiding and infection. Reveals new methods to conceal shellcode and manipulate logging functions.
Panel discussion on PAM maturity, exploring the journey from zero trust to least privilege. Industry experts share insights on implementing effective privileged access management strategies in modern cybersecurity landscapes.
Explore a novel Android kernel exploitation technique using TrustZone to bypass security mitigations, achieve 100% reliability, and create a versatile exploit applicable across devices and versions.
Explore software-defined networking for enhanced network security, focusing on DDoS defense and traffic programming using Snort and its dependencies to mitigate WAF bypass attempts.
Panel discussion exploring how CXOs can leverage cyber threat intelligence for enhanced security collaboration and proactive defense strategies in today's evolving threat landscape.
Explore a novel type checker enforcing PDF specifications, uncovering deviations in tools and contributing to improvements in the PDF 2.0 standard. Learn about SPARTA and PDFFixer for enhanced PDF file management.
Panel discussion exploring cloud services' potential and challenges for financial inclusion, featuring insights from cybersecurity experts and industry leaders.
Leveraging Semgrep to identify vulnerabilities in WordPress plugins, reducing false positives, and automating XSS validation. Includes demos on custom rule creation and the XSSBomb tool.
Panel discussion with program managers sharing insights on running bug bounty programs, challenges faced, and best practices for organizations.
Strategies for blue teams to manage bug bounty programs effectively, balancing security needs with researcher experience. Focuses on mitigating operational risks and optimizing defense rules for real threats.
Explore how service workers can be exploited to bypass corporate firewalls, potentially compromising network security. Learn about this innovative attack vector and its implications.
Insights into securing open source software through HackerOne programs and Internet Bug Bounty. Learn approaches for targeting OSS, reporting processes, and recent interesting bug discoveries.
Panel discussion exploring how emerging technologies affect CISO careers, featuring insights from industry leaders on adapting to evolving cybersecurity challenges and opportunities.
Get personalized course recommendations, track subjects and courses with reminders, and more.