Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how CCTV camera blind spots create security vulnerabilities through location-based confidence weakness, and learn about TipToe - a novel evasion attack demonstrating detection flaws across various conditions.
Discover practical strategies to detect and defend against digital deception across network layers, from electromagnetic spoofing to false narratives, while developing critical skills to discern truth in our interconnected world.
Explore CAN bus protocol vulnerabilities in automotive systems, focusing on how attackers can exploit metadata fields and protocol specifications to create denial-of-service attacks in embedded systems.
Dive into the security vulnerabilities of GitHub Actions, exploring how malicious code can spread through Action dependencies and learning essential defense strategies against CI/CD platform attacks.
Discover security vulnerabilities in VPN Always-On implementations, exploring bypass techniques and hardening strategies for better network protection and data leak prevention.
Dive into techniques for exploiting command and control server vulnerabilities, uncovering infrastructure weaknesses, and exposing threat actors through common web application security flaws.
Delve into Windows Container isolation mechanisms, file system separation techniques, and security implications, including methods to manipulate container frameworks for enhanced system protection.
Dive into advanced email security exploitation techniques, learning how to bypass SPF & DMARC through Cloudflare partnerships and serverless applications for domain spoofing.
Discover advanced return-oriented programming techniques with ROP ROCKET framework, featuring syscall bypassing, cross-architecture exploitation, and innovative bad byte handling for enhanced security testing.
Explore how Idaho National Labs leverages XR technologies and digital twinning to revolutionize data visualization, signal analysis, and autonomous operations in nuclear and security missions.
Discover an innovative Windows privilege escalation technique that exploits the Windows Filtering Platform, enabling stealthy system-level access through network traffic manipulation and kernel component abuse.
Discover how civil cyber defenders protect vulnerable organizations, journalists, and activists using OSINT skills and open-source tools while combating human trafficking and surveillance threats.
Uncover a complete exploit chain vulnerability in Azure B2C, from cryptographic misuse to full account compromise, including novel attack methods for crypto key recovery and its impact on Microsoft's bug bounty system.
Uncover critical vulnerabilities in digital signature validation systems and learn how attackers can exploit certificate misuse to bypass security measures for signing untrusted code.
Dive into Windows Defender's architecture and signature update vulnerabilities, exploring how unprivileged users can exploit security flaws to compromise Windows systems and manipulate EDR functionality.
Get personalized course recommendations, track subjects and courses with reminders, and more.