Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Communication Skills
Software Development
Digital Marketing
How to Write Your First Song
Bioseguridad y equipo de protección para la prevención de COVID-19
Let's Get Started: Building Self-Awareness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Java deserialization vulnerabilities, focusing on remote code execution through XML and binary deserialization. Learn about CVEs, tools, and future research in this area.
Explore advanced OS X exploitation techniques, Mach messaging, and system integrity protection. Learn to bypass security measures and load unsigned kernel extensions.
Explore virtualization system vulnerabilities, focusing on cloud computing attacks, fuzzing frameworks, and hardware virtual component testing methods for enhanced cybersecurity.
Explore OSX El Capitan's security features, including System Integrity Protection, and learn about potential vulnerabilities and exploitation techniques in this comprehensive analysis.
Explore key value injections, their impact on serialization, and implications for React and CouchDB in this technical deep dive.
Explore Group Policy vulnerabilities in Windows networks, including attack scenarios, exploit processes, and mitigation strategies for domain controllers and members.
Explore the complexities of designing secure encrypted hard drives, covering security models, components, encryption methods, potential vulnerabilities, and protective measures against various attack vectors.
Explore HARES, an advanced anti-reverse engineering system. Learn about TLB splitting, program verification, and security implications for Windows kernel protection.
Explore iOS security vulnerabilities, jailbreak techniques, and Apple's responses across iOS 6-8. Gain insights into historical exploits and the evolving landscape of iOS security.
Explore Snapdragon power regulation frameworks, from device selection to thermal management and USB stacks. Learn about potential pitfalls and gain insights into mobile hardware development.
Explore evolving malware threats, automatic diversity techniques, and compiler-based diversification strategies to enhance cybersecurity defenses against self-diversifying malware.
Explore Windows Phone 8 app security, covering structure, models, restrictions, encryption, and vulnerabilities. Learn about marketplace validation and protection strategies.
Explore scientific best practices for addressing recurring issues in computer security R&D, covering sidechannels, detection, cyber mission planning, and more.
Explore Linux memory forensics through a real-life case study, covering technical details, dynamic linking, PLT, and Volatility, with a practical demonstration.
Explore attack and defense toolkits in high and low frequency environments, gaining insights into cybersecurity strategies and techniques used in various network scenarios.
Get personalized course recommendations, track subjects and courses with reminders, and more.