Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore data leakage techniques using branch-free predictor training, from phantom to inception, in modern processors.
Explore practical exploitation techniques for Windows kernel registry vulnerabilities, enhancing your understanding of system security and potential attack vectors.
Explore the evolution and future of password cracking techniques with insights from a renowned security expert. Gain valuable knowledge on cybersecurity challenges and solutions.
Explore Apple's Lightning protocol, learn iPhone JTAGging techniques, and discover fuzzing methods for potential vulnerabilities and profit.
Explore the ecology of information security, examining strategic force design, great power conflicts, and the evolving role of hackers in modern systems and deterrence.
Explore Linux kernel exploitation techniques, from attack surface mapping to vulnerability discovery and exploit development. Gain insights into advanced kernel exploitation methods and tools.
Explore XNU virtual memory auditing and exploitation techniques, focusing on the MacDirtyCow vulnerability in Apple's operating systems.
Explore Windows exploitation techniques, bypassing security measures like HVCI and EDR, with insights on disabling drivers and practical demonstrations.
Explore Intel microcode reverse engineering and customization techniques, uncovering CPU vulnerabilities and enhancing processor functionality.
Explore vulnerability research evolution, from buffer overflows to advanced fuzzing and exploit mitigations. Analyze case studies and future trends in offensive and defensive security strategies.
Explore MojoBlob Registry's code structure, service-side dispatch, and potential security vulnerabilities in Windows naming conventions.
Explore Apple's kernel vulnerabilities, attack surfaces, and mitigations. Learn advanced fuzzing techniques and root cause analysis for enhanced security understanding.
Explore advancements in JavaScript engine fuzzing, covering techniques like splicing, code coverage, and hybrid engines to enhance bug discovery and security testing.
Explore cutting-edge vulnerabilities in modern smartphones, examining software and hardware innovations that introduce new security challenges.
Explore techniques for hacking Shannon baseband from a phone, uncovering vulnerabilities and potential exploits in mobile communication systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.