Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Hack.lu. Dive deep into the latest insights, research, and trends from the world's leading experts.
Discover cutting-edge pentest techniques for efficient and comprehensive engagements, focusing on CSV tools, parallel execution, and innovative applications.
Explore path normalization vulnerabilities in web frameworks, including real-world examples and case studies of critical security flaws leading to remote code execution and access control bypass.
Explore methodologies for evaluating and selecting the most suitable Threat Intelligence provider, focusing on comparison metrics, data analysis, and key takeaways for various cybersecurity roles.
Explore ARM shellcode techniques, from basic execve() to advanced "Quantum Leap" code, covering tight spaces, mprotect egghunters, and ARM-Thumb switching for efficient exploitation.
Learn strategies for protecting politically vulnerable organizations from digital threats, covering physical and psychological security, incident response, and data retention policies.
Explore vulnerabilities in inter-process communication (IPC) systems, including network sockets, Windows named pipes, and USB devices. Learn about potential attacks and mitigation strategies.
Explore techniques for bypassing anti-DDoS measures using older technologies, focusing on UDP data analysis, intelligence gathering, and protocol effectiveness.
Explore SS7 vulnerabilities and Trojan attacks that bypass security measures, focusing on signal messages, numbering plans, and location tracking in mobile networks.
Explore the security vulnerabilities of fax technology, including debugging challenges, attack vectors, and mitigation strategies in this comprehensive analysis.
Explore the evolution and tactics of "The Snake" malware, including infection vectors, lateral movement, and backdoor mechanisms in this cybersecurity analysis.
Explore real-world threat intelligence in activism, emergency response, and political adversaries. Learn to diagnose problems, develop treatment plans, and understand various security threats.
Explore a framework for detecting threats in telecom networks, covering monitoring, data collection, and analytics to protect infrastructure and subscribers from various attacks and privacy issues.
Explore vulnerability disclosure's evolution, its impact on policy-making, and the role of governments. Learn about bug bounties, legal considerations, and international efforts in cybersecurity.
Guidance for development teams on implementing effective security strategies, covering risk assessment, compliance, staffing, and integrating security into organizational culture and processes.
Explore techniques for exploiting notorious Remote Administration Tools used in targeted attacks, turning the tables on sophisticated adversaries and exposing vulnerabilities in their command and control systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.