Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master binary diffing techniques for *OS platforms, focusing on extracting and analyzing IPSW files, comparing binaries, and understanding security patches using open-source tools like ipsw and Ghidra.
Delve into the reconstruction of CVE-2023-41990, exploring TrueType font vulnerabilities in macOS and iOS through detailed analysis of Apple's font rendering system and exploit mechanisms.
Explore innovative techniques for mapping macOS malware in 3D space, enabling better threat detection and family identification through advanced data science methodologies.
Master keynote presentation skills and transform from "keynope to keydope" with expert guidance on public speaking techniques and presentation delivery methods.
Explore Apple's Darwin Kernel evolution and XNU security enhancements, from KTRR to exclaves, revealing groundbreaking kernel protections exclusive to Apple silicon platforms.
Explore how adversaries use Docker and Apple's native containers to evade macOS security defenses, plus learn detection strategies for containerized attacks.
Discover how ML and MITRE ATT&CK methodology solve macOS malware's identity crisis, transforming generic detections into precise threat classification and family identification.
Uncover BlueNoroff's sophisticated DPRK attack chain, from process injection to Objective-C keyloggers, analyzing advanced tradecraft used in targeted macOS intrusions.
Discover how to reverse engineer macOS XProtect Remediator, uncovering advanced detection mechanisms including OCR-based malware identification and Apple's exclusive threat intelligence.
Discover how to exploit Apple Compressor's 0-click RCE vulnerability through reverse engineering, network protocol analysis, and sandbox bypass techniques in this security research presentation.
Discover innovative malware simulation techniques to detect iOS spyware by mimicking known threats, identifying forensic indicators, and transforming chaotic data into focused investigations.
Uncover DPRK-linked macOS malware targeting crypto developers through fake job interviews, analyzing Koi Stealer's sophisticated AppleScript tactics and C2 communication methods.
Explore XNU virtual memory vulnerabilities and learn how to exploit memory zeroing issues to achieve root access on macOS through detailed technical analysis.
Uncover statistical methods to detect macOS command & control communication by analyzing log patterns, timing irregularities, and implementing detection using OSQuery and Filebeat.
Dive into Apple's first in-house C1 baseband architecture, comparing it to Qualcomm/Intel designs while exploring security features and automated carrier profile monitoring tools.
Get personalized course recommendations, track subjects and courses with reminders, and more.