Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into essential app security principles and best practices for iOS development, exploring threat modeling, encryption implementation, and secure coding techniques.
Discover advanced techniques for detecting concealed sanctioned mobile apps, focusing on iOS reverse engineering methodologies and practical detection strategies.
Explore the evolving landscape of macOS stealer malware threats, examining current trends, detection methods, and defensive strategies for protecting Apple systems in 2024.
Discover how to extract valuable insights from crash reports for enhanced macOS security analysis and malware detection, featuring expert techniques and real-world applications.
Dive into the world of cryptojacking through real-world examples and expert analysis, exploring detection techniques, attack methods, and defensive strategies for protecting systems against cryptocurrency mining malware.
Discover essential strategies for Mac endpoint security and resilience, exploring immune system-like defenses to protect against modern threats and vulnerabilities.
Discover advanced techniques for detecting macOS malware through network framework analysis, focusing on heuristic methods and system-level monitoring approaches.
Delve into the critical world of digital stalking and surveillance technology, exploring how personal devices can be weaponized for harassment and learning essential protection strategies.
Explore the evolving world of Mac malware threats, detection techniques, and defense strategies through expert analysis of current attack patterns and security vulnerabilities.
Explore Apple's Launch and Environment Constraints security features in macOS, understanding their implementation, impact on system protection, and practical application for third-party developers.
Dive into an eye-opening exploration of macOS filesystem vulnerabilities, discovering critical security flaws and innovative attack techniques that led to multiple zero-day discoveries and Apple bounties.
Delve into Apple's satellite emergency SOS and location sharing services, exploring their security measures, authentication systems, and integration with GlobalStar network for iPhone emergency communications.
Discover how to enhance macOS security through Kronos, an open-source tool that extends TCC (Transparency, Consent & Control) features to better protect sensitive data and improve user awareness.
Delve into advanced iOS security with an analysis of Safari sandbox escapes, IPC exploitation techniques, and real-world attack chains targeting iOS 16's hardened renderer sandbox.
Delve into macOS security vulnerabilities through XPC communication analysis, focusing on audit token spoofing and privilege escalation exploits in the smd service (CVE-2023-32405).
Get personalized course recommendations, track subjects and courses with reminders, and more.