Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in Electron-based desktop apps, including novel attack vectors for remote code execution, with demonstrations on popular applications like Discord and VSCode.
Explore Fuchsia OS from a security perspective as a Linux kernel expert examines its architecture, design principles, and potential vulnerabilities, offering insights for both developers and security professionals.
Explore blockchain bridge designs, security vulnerabilities, and real-world exploits. Learn about smart contract risks, best practices, and the impact of hacks on cross-chain value transfer systems.
Exploring web security's 20-year stagnation, this talk examines past mistakes and proposes future solutions, aiming to renovate mindsets and break the cycle of recurring vulnerabilities.
Explore a critical AWS CloudFormation vulnerability, its impact on cloud security, and the disclosure process. Gain insights into cloud infrastructure vulnerabilities and future research directions.
Explore the security risks of deep links in Android apps, focusing on vulnerabilities in Samsung's camera app that allow unauthorized access to sensitive features without permissions.
Hands-on lab exploring real malware samples, demonstrating how software emulation aids in quick analysis of simple and complex malware, including techniques for interacting with and understanding obfuscated code.
Practical insights into 5G network security, comparing with previous generations. Explores vulnerabilities, implementation differences, and experimental findings. Discusses expectations for the second phase of 5G networks.
Discover how to detect weak cryptographic keys at scale using the badkeys tool and service. Learn about past vulnerabilities and new findings in TLS certificates and IoT devices.
Expert panel discussion on Web3's future, featuring insights from leaders at Trail of Bits, Brave Software, and Ledger. Explores potential impacts, challenges, and opportunities in the evolving blockchain and cryptocurrency landscape.
Techniques for retrieving passphrases and encryption keys from memory dumps of GPG processes, including Volatility3 plugins for key material extraction and potential defensive applications against ransomware.
Explore techniques to bypass Microsoft's AM-PPL technology and disable EDR products, presented by experienced red team leaders. Learn about vulnerabilities in Windows security measures and their potential exploitation.
Exposé des vulnérabilités critiques dans les plateformes de bureau virtuel du métavers, avec démonstrations d'attaques et recommandations de sécurité pour les développeurs et utilisateurs.
Panel discussion featuring women leaders in tech exploring strategies to increase diversity in bug hunting and cybersecurity, sharing insights and experiences from their roles at major tech companies.
Panel discussion on bug bounty programs: processes, rewards, transparency, and improving relationships between organizations and security researchers.
Get personalized course recommendations, track subjects and courses with reminders, and more.