Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Software Development
Digital Marketing
Advanced Precalculus: Geometry, Trigonometry and Exponentials
Introduction to Animal Behaviour
Astronomy: Exploring Time and Space
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from nullcon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore PACKJ, a security framework for detecting risky open-source packages. Learn about supply chain attacks, defense strategies, and real-world examples to enhance your software security practices.
Explore techniques for building secure software through bytecode mutation, including obfuscation, encryption, and cross-compilation to protect against reverse engineering and enhance product security.
Explore macOS malware detection techniques, built-in utilities exploited by threat actors, and strategies to identify suspicious activity on Apple systems in this comprehensive security analysis.
Explore a critical iOS design flaw allowing remote code execution through debug session hijacking. Learn about the vulnerability's discovery, research, exploitation, and Apple's fix.
Explore Linux kernel patching challenges, ecosystem fragmentation, and automated solutions. Learn about tools for assessing patch completeness and improving security in Linux devices and distributions.
Explore the inner workings and mysterious history of CosmicStrand, a sophisticated UEFI firmware bootkit that provides deep persistence on select motherboards, evading detection and surviving OS reinstallations.
Explore Bheem OS, a next-gen secure operating system that isolates apps in MicroVMs, offering enhanced security, usability, and performance. Learn about its architecture, features, and advantages over traditional systems.
Learn about OWASP ModSecurity Core Rule Set, a powerful open-source web application firewall. Discover key features like paranoia levels and anomaly scoring, and see its effectiveness in protecting against various attacks.
Explore the full stack hack of AppleTV3, uncovering vulnerabilities and jailbreaking techniques. Learn tricks for attacking restricted devices and gain insights into iOS security.
Explore techniques for uncovering elusive web vulnerabilities, from advanced methods to overlooked basics. Learn strategies to enhance your security auditing skills and find flaws others miss.
Discover cyber threat intelligence essentials, including analyst skills, frameworks, daily tasks, and maintaining anonymity. Learn to put intelligence into action for effective cybersecurity.
Explore macOS security features, vulnerabilities, and bypass techniques with a Microsoft security expert. Gain insights into SIP, TCC, and potential exploit avenues for researchers and professionals.
Explore the impact of log4j vulnerability, its industry-wide effects, and strategies for mitigating similar threats in 2022 with experts Alvaro Munoz and Joe Slowik.
Explore the Bhadra framework for threat modeling in mobile communication systems, addressing complex security challenges and providing a structured approach to analyze adversarial behaviors in telecom networks.
Comprehensive overview of ransomware, including history, current attacks, hacker groups, and defense strategies. Explores cyber security frameworks and principles for effective recovery and protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.