Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Psychology
Digital Marketing
Video Editing
Songwriting: Writing the Lyrics
A Scuola con Raffaello
Food as Medicine
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore NetflOSINT: Leveraging overlooked Netflow data for efficient network forensics. Learn extraction techniques, analysis methods, and tools to enhance threat hunting and intelligence gathering.
Uncover critical vulnerabilities in industrial remote access solutions using OpenVPN, potentially leading to remote code execution. Learn about the risks and implications for cybersecurity.
Discover social engineering tactics, real-world attacks, and protective strategies. Learn about OSINT techniques, vishing strategies, and methods to safeguard organizations against evolving threats in this eye-opening presentation.
Explore security vulnerabilities in GPS trackers, including traffic analysis, SMS configuration exploitation, protocol reverse engineering, and GPS signal spoofing. Learn about privacy risks and potential attack scenarios.
Explore a new defense evasion technique, Process Reimaging, exploiting Windows OS vulnerabilities to bypass endpoint security solutions like Windows Defender. Learn attack vectors, weaponization, and protection recommendations.
Explore advanced payload generation techniques for red team engagements, including bypassing endpoint protections and evading sandboxing through innovative methods like XML stylesheets and COM.
Explore dynamic .NET runtime access using Python, bypassing PowerShell restrictions for stealthy offensive operations in Windows environments.
Explore innovative social engineering techniques, including memory image analysis and rogue Wi-Fi attacks, along with defensive strategies and ethical considerations for cybersecurity professionals.
Explore vulnerabilities in Google Play Billing API, analyzing real-world examples and demonstrating how attackers can bypass payment processes in popular Android games through reverse engineering.
Explore techniques to bypass Windows 10's Device Guard, including VBA, trusted documents, and alternative execution vectors. Dive into internals of scripting engines and host processes.
Exploring IPv6 security policies and their mismatches with IPv4, revealing real-world implications for dual-stacked sites through a wide-scale evaluation project.
Explore hardware hacking of a Bluetooth smartlock, from circuit board analysis to exploit development, covering electronics basics, reverse engineering, and mobile app vulnerabilities.
Explore Linux Audit daemon with Auditbeat for centralized event monitoring, file integrity checks, and security breach detection using interactive dashboards and log analysis.
Debate on hackers, media, truth, and trust. Explores fact-checking, vulnerability disclosure, fake news, and regaining trust in the digital age. Features expert panel discussion and audience participation.
Explore 802.1x network access control, its vulnerabilities, and bypass techniques. Learn why it's not a perfect solution for critical asset protection and how attackers can exploit it.
Get personalized course recommendations, track subjects and courses with reminders, and more.