Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Web Development
Python
Teaching Young Learners Online
The Science of Everyday Thinking
Know Thyself - The Value and Limits of Self-Knowledge: The Examined Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploración detallada de vulnerabilidades en redes VoLTE, demostrando cómo un atacante puede acceder y controlar la red IMS con equipo económico, permitiendo servicios móviles no autorizados.
Exploración detallada de una vulnerabilidad en el SDK Gecko de Silicon Labs, revelando cómo se puede eludir el arranque seguro y la verificación de firmware en dispositivos IoT.
Explore Windows Event Log persistence techniques, bypassing security measures, and elevating privileges in red team operations. Learn innovative approaches for undetectable attacks using Windows itself.
Unveiling a Windows design flaw allowing privilege escalation from Medium to High integrity level, demonstrating a 100% reliable exploit on the latest Windows versions.
Uncover novel techniques to identify and exploit flawed logic in honeypots, enabling counter-intelligence activities. Learn about comprehensive research on 40 honeypots and global scan analysis findings.
Unveiling security flaws in TETRA radio systems used by government agencies and critical infrastructure. Demonstrates vulnerabilities in encryption, authentication, and identity protection, enabling practical attacks on confidentiality and integrity of c…
Exploración de vulnerabilidades en la implementación de memoria virtual de CPUs modernas, enfocándose en paginación y TLB, y su impacto en la seguridad, especialmente en virtualización y SLAT (EPT).
Explore challenges and solutions in privacy infrastructure, comparing open-source and commercial options. Learn from Meta's experience in building scalable, secure, and efficient privacy systems.
Explora el proceso de descubrimiento y explotación de vulnerabilidades 0-day en routers D-Link, desde obtener acceso al firmware hasta identificar y explotar fallos de seguridad para lograr ejecución remota de código.
Explore emerging LLM security risks, including Indirect Prompt Injections and data exfiltration. Learn real-world exploits and mitigation strategies for ChatGPT, Google Bard, and other AI platforms.
Explore adversary emulation for cybersecurity through CTI analysis, red team development, and attack simulation. Learn to improve defenses by understanding and replicating advanced threat actors' techniques.
Explore Beacon Object Files for red-teaming, including COFF format, in-memory execution, and Coffee - a Rust COFF loader. Learn to enhance C2 agents and bypass AV/EDR protection.
Explore real-world IP camera hijacking through LAN RCE vulnerabilities, diving into firmware analysis, exploit development, and post-exploitation techniques to manipulate video streams while maintaining camera functionality.
Análisis de 4Tb de logs de malware para identificar perfiles legÃtimos de actores de amenazas, demostrando vulnerabilidades en sus métodos de OPSEC y potencial para validación forense.
Herramienta de emulación de adversarios OT de código abierto que combina ataques IT y OT, reproduce acciones de malware ICS y soporta múltiples protocolos para pruebas de seguridad industrial eficientes.
Get personalized course recommendations, track subjects and courses with reminders, and more.