Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Tácticas rápidas de respuesta a incidentes en la nube: demostración práctica de detección y mitigación de amenazas en AWS utilizando herramientas nativas, basado en escenarios reales de ataques.
Análisis de la relación entre hackers, clickbait y rating desde la perspectiva periodÃstica, explorando los desafÃos del periodismo y la importancia de la participación comunitaria en la difusión de información tecnológica.
Explore how ANSI escape sequences can inject, vandalize, and weaponize plaintext logfiles. Learn about terminal injection, log tampering techniques, and their modern implications for cloud CLI's and DevOps environments.
Exploración detallada de vulnerabilidades en redes VoLTE, demostrando cómo un atacante puede acceder y controlar la red IMS con equipo económico, permitiendo servicios móviles no autorizados.
Exploración detallada de una vulnerabilidad en el SDK Gecko de Silicon Labs, revelando cómo se puede eludir el arranque seguro y la verificación de firmware en dispositivos IoT.
Explore Windows Event Log persistence techniques, bypassing security measures, and elevating privileges in red team operations. Learn innovative approaches for undetectable attacks using Windows itself.
Unveiling a Windows design flaw allowing privilege escalation from Medium to High integrity level, demonstrating a 100% reliable exploit on the latest Windows versions.
Uncover novel techniques to identify and exploit flawed logic in honeypots, enabling counter-intelligence activities. Learn about comprehensive research on 40 honeypots and global scan analysis findings.
Unveiling security flaws in TETRA radio systems used by government agencies and critical infrastructure. Demonstrates vulnerabilities in encryption, authentication, and identity protection, enabling practical attacks on confidentiality and integrity of c…
Exploración de vulnerabilidades en la implementación de memoria virtual de CPUs modernas, enfocándose en paginación y TLB, y su impacto en la seguridad, especialmente en virtualización y SLAT (EPT).
Explore challenges and solutions in privacy infrastructure, comparing open-source and commercial options. Learn from Meta's experience in building scalable, secure, and efficient privacy systems.
Explora el proceso de descubrimiento y explotación de vulnerabilidades 0-day en routers D-Link, desde obtener acceso al firmware hasta identificar y explotar fallos de seguridad para lograr ejecución remota de código.
Explore emerging LLM security risks, including Indirect Prompt Injections and data exfiltration. Learn real-world exploits and mitigation strategies for ChatGPT, Google Bard, and other AI platforms.
Explore adversary emulation for cybersecurity through CTI analysis, red team development, and attack simulation. Learn to improve defenses by understanding and replicating advanced threat actors' techniques.
Explore Beacon Object Files for red-teaming, including COFF format, in-memory execution, and Coffee - a Rust COFF loader. Learn to enhance C2 agents and bypass AV/EDR protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.