Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Information Technology
Digital Marketing
Six Sigma Part 1: Define and Measure
Know Thyself - The Value and Limits of Self-Knowledge: The Examined Life
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore API security challenges in microservices architectures and learn strategies for distributed security, including gateways, service mesh, authentication, and network segmentation.
Explore vulnerabilities in Building Management Systems, their impact on critical facilities, and the research process behind discovering these security flaws in various BMS components and products.
Explore blockchain technology as a cutting-edge defense mechanism in cybersecurity, examining its potential applications and impact on digital security strategies.
Explore car hacking techniques, focusing on radio frequencies and BLE. Learn about Rolling Codes analysis and practical steps to conduct research on vehicle security vulnerabilities.
Prize giving ceremony and closing remarks for the HITB2023AMS Capture The Flag competition, highlighting achievements and concluding the event.
Exploring the interplay between cybersecurity attacks and defenses, this talk examines evolving strategies, stakeholder mindsets, and proactive approaches for a more secure digital future.
Explore Web3 fundamentals, including blockchain transactions, technology stack, token standards, and security risks, using OSINT techniques and free online tools.
Explores security risks in modern CNC machines, demonstrating practical attacks and discussing mitigation strategies for Industry 4.0 vulnerabilities in manufacturing environments.
Explore privilege escalation in MacOS using Data-Oriented Programming (DOP), a powerful exploit technique that leverages heap buffer overflow vulnerabilities for persistent attacks resistant to kernel code changes.
Explore GarminOS and MonkeyC VM, uncovering critical vulnerabilities in Garmin devices. Learn about reverse engineering, virtual machine internals, and exploiting low-level security flaws in smart fitness technology.
Comprehensive exploration of Active Directory attack techniques, demonstrating real-world abuse primitives and attack paths. Includes practical demonstrations and operational guidance for both offensive and defensive perspectives.
Exploring ARM Trusted Firmware, secure boot, and encryption vulnerabilities in smart devices. Demonstrates exploits on Lenovo clock and SONOS One, revealing secrets and breaking security boundaries.
Exploración de vulnerabilidades crÃticas en SAP, demostrando técnicas avanzadas de explotación HTTP y desincronización para comprometer sistemas empresariales. Incluye demostraciones prácticas y análisis de impacto en la seguridad global.
Explore how ChatGPT can be used to create advanced polymorphic malware, discussing the challenges, implementation techniques, and potential threats posed by AI-generated malicious software.
Innovative approach for IoT black-box fuzzing using "fuzzing triggers" from companion apps to generate optimal inputs, overcoming limitations of existing tools and discovering zero-day vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.