Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore smart meter security vulnerabilities and a new open-source framework for embedded device analysis. Learn about critical infrastructure risks and tools for assessing obscure networks and protocols.
Explore 10 critical DDoS mitigation failures, their technical details, and recommended solutions. Learn from industry leaders' mistakes to enhance your defense strategies against sophisticated attacks.
Explores flaws in current cybercrime metrics, advocating for standardized, business-focused measurements to improve threat intelligence and risk analysis across all enterprise sizes.
Automated malware analysis system for extracting payloads, configurations, and indicators from sophisticated malware, reducing time and skill requirements for threat intelligence.
Explore vulnerabilities in SAP HANA platform, including on-premise, cloud, and IoT deployments. Learn attack vectors, technical details, and prevention strategies for securing critical business data.
Exploración de técnicas avanzadas de explotación de vulnerabilidades Use-After-Free en Adobe Flash, incluyendo el método UAUAF para obtener acceso completo a la memoria y ejecución de código arbitrario.
Explore novel VLAN hopping methods using SNMP, including live demos and the release of Frogger 2 tool for automated and improved network security testing.
Explore common hardware hacking pitfalls, recovery methods, and prevention strategies. Learn from experts' experiences to avoid damaging your projects and gain confidence in hardware experimentation.
Demystifying domain trusts: Enumeration, visualization, and exploitation techniques for red teams. Learn to leverage trust relationships for domain takeover without exploits.
Exploring emerging strategies and positive developments in cybersecurity defense, offering hope and practical solutions for improving security posture in an offense-dominated landscape.
Explore EFI firmware vulnerabilities in Apple devices, their potential for powerful rootkits, and learn techniques to detect and combat these stealthy "monsters" in the low-level system architecture.
Explore SDN security implications, attack surfaces, and vulnerabilities with live exploit demos. Learn about efforts to enhance SDN controller security and future developments.
Detailed exploration of vulnerabilities and exploit techniques used to compromise 64-bit Internet Explorer on Windows 8.1, including ASLR & CFG bypass and sandbox escape, as demonstrated at Pwn2Own 2015.
Explore Windows 10's security features and vulnerabilities, examining new protections and potential weaknesses in system services, Edge browser, and user account control.
Explore real-world experiences of security researchers attempting responsible disclosure, highlighting challenges, vendor responses, and lessons learned in vulnerability reporting.
Get personalized course recommendations, track subjects and courses with reminders, and more.