Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from SyScan360. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore Java deserialization vulnerabilities, focusing on remote code execution through XML and binary deserialization. Learn about CVEs, tools, and future research in this area.
Explore advanced OS X exploitation techniques, Mach messaging, and system integrity protection. Learn to bypass security measures and load unsigned kernel extensions.
Explore virtualization system vulnerabilities, focusing on cloud computing attacks, fuzzing frameworks, and hardware virtual component testing methods for enhanced cybersecurity.
Explore OSX El Capitan's security features, including System Integrity Protection, and learn about potential vulnerabilities and exploitation techniques in this comprehensive analysis.
Explore key value injections, their impact on serialization, and implications for React and CouchDB in this technical deep dive.
Explore Group Policy vulnerabilities in Windows networks, including attack scenarios, exploit processes, and mitigation strategies for domain controllers and members.
Explore the complexities of designing secure encrypted hard drives, covering security models, components, encryption methods, potential vulnerabilities, and protective measures against various attack vectors.
Explore HARES, an advanced anti-reverse engineering system. Learn about TLB splitting, program verification, and security implications for Windows kernel protection.
Explore iOS security vulnerabilities, jailbreak techniques, and Apple's responses across iOS 6-8. Gain insights into historical exploits and the evolving landscape of iOS security.
Explore Snapdragon power regulation frameworks, from device selection to thermal management and USB stacks. Learn about potential pitfalls and gain insights into mobile hardware development.
Explore evolving malware threats, automatic diversity techniques, and compiler-based diversification strategies to enhance cybersecurity defenses against self-diversifying malware.
Explore Windows Phone 8 app security, covering structure, models, restrictions, encryption, and vulnerabilities. Learn about marketplace validation and protection strategies.
Explore scientific best practices for addressing recurring issues in computer security R&D, covering sidechannels, detection, cyber mission planning, and more.
Explore Linux memory forensics through a real-life case study, covering technical details, dynamic linking, PLT, and Volatility, with a practical demonstration.
Get personalized course recommendations, track subjects and courses with reminders, and more.