Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Marketing
Web Development
Graphic Design
Incarceration: Are Prisons a Suitable Punishment?
Mining Massive Datasets
Modern & Contemporary American Poetry (“ModPo”)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in Building Management Systems, their impact on critical facilities, and the research process behind discovering these security flaws in various BMS components and products.
Explore API security challenges in microservices architectures and learn strategies for distributed security, including gateways, service mesh, authentication, and network segmentation.
Explore blockchain technology as a cutting-edge defense mechanism in cybersecurity, examining its potential applications and impact on digital security strategies.
Innovative static taint analyzer for third-party SDKs, addressing challenges in user data protection and privacy policy compliance. Achieves high accuracy in identifying undisclosed information collection behaviors.
Exposé des failles de la protection contre les ransomwares de Windows, démonstration de méthodes de contournement et d'attaques à distance, avec vidéos à l'appui.
Discover a stealthy Windows persistence technique that creates invisible machine accounts, evades detection, and impersonates existing users. Learn about the Suborner Attack's implementation and effectiveness.
Reverse engineering KeeLoq systems: extracting firmware, decrypting transmissions, and integrating with home automation. Practical approach to exploiting known vulnerabilities in remote keyless entry systems.
Explore defensive security, journalism protection, and diverse tech challenges with insights on gun hacking, malware analysis, and mission-driven work from a seasoned security expert.
Exploration of common vulnerabilities in Web3 projects, covering blockchain topology, node exploitation, DoS attacks, social engineering, and smart contract vulnerabilities in cryptocurrency systems.
Explore vulnerabilities in MacOS security features and learn how to bypass them for a one-click takeover of both Apple Silicon and Intel Mac devices. Includes live demo and expert insights.
Insights on EDR inner workings and evasion techniques for red teamers, covering test lab results, reverse engineering findings, and successful attack methodologies to circumvent endpoint protection.
Detailed exploration of exploiting a Linux kernel vulnerability in Ubuntu 22.04 to achieve local privilege escalation, focusing on advanced exploitation techniques and bypass methods.
Demystifying remote Linux kernel exploitation through a stack overflow vulnerability in a network module, offering insights into the exploit development process and low-level kernel internals.
Uncovers critical vulnerabilities in WPA3, including DoS attacks and traffic interception. Presents a new Wi-Fi testing framework for researchers to identify and exploit these weaknesses in various devices.
Explore IoT security challenges in enterprises, examining millions of devices to reveal vulnerabilities, default credentials, and outdated firmware. Gain insights into the current state of IoT security.
Get personalized course recommendations, track subjects and courses with reminders, and more.