Courses from 1000+ universities
2U’s 2023 Q3 results triggered a 50% stock drop. The company is currently valued at below $80 million.
600 Free Google Certifications
Design & Creativity
Financing Innovative Ventures
Comprendere la filosofia
How to Write Your First Song
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from USENIX Workshop on Offensive Technologies (WOOT). Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore AFL++, a community-driven open-source tool that incorporates cutting-edge fuzzing research, offered by USENIX. Learn about its novel features and potential for future research.
Explore Huawei's Trusted Execution Environment's design flaws and vulnerabilities in this USENIX offering. Learn about reverse-engineering, decryption, and hardware-backed cryptography in under an hour.
Explore how to build browser red pills to detect virtual environments with Stanford and Google experts in this less than 1-hour USENIX offering.
Learn to optimize ZMap network scanner for a 10-fold increase in scan rate with USENIX. Understand implications for defenders and attackers in under an hour.
Explore the security flaws in US traffic infrastructure with USENIX. Learn about systemic failures, potential attacks, and recommendations for improvement in under an hour.
Explore the security implications of high-resolution smartphone cameras with Berlin University of Technology. Learn about potential threats and mitigation strategies in under an hour.
Explore how mobile devices can use inaudible sound as a covert channel for data exfiltration in this USENIX offering. Learn about ultrasonic and isolated sound-based channels and their regulation.
Learn PCB reverse engineering techniques from Joe Grand at USENIX, using both home-based solutions and advanced technologies. Less than 1-hour workload.
Explore TCP protocol vulnerabilities and DDoS amplification attacks in this short program by USENIX. Learn to identify potential amplifiers and understand unforeseen device reactions.
Explore IPv6 security vulnerabilities and countermeasures with USENIX in under an hour. Learn about historical underestimations, IPsec support, and current security challenges.
Explore USENIX's brief study on Cage, a kernel-level mechanism for monitoring memory events, using Wireshark for capturing and displaying these events.
Explore the security of web applications in Autonomous Systems with USENIX. Learn about flaws and misconfigurations that can lead to remote command execution on routers.
Learn to lower the USB fuzzing barrier with USENIX's concise program. Understand how to read and modify USB communication, perform two-way emulation, and discover new security bugs.
Explore automated reverse engineering techniques using Lego® robots with USENIX. Learn to identify security vulnerabilities in smartcard readers in under an hour.
Explore the security of contactless payment cards and NFC with USENIX. Learn about attack scenarios and how to create functional clones of cards in under an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.