Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore machine learning techniques for efficient security code reviews, reducing false positives and automating vulnerability classification in large-scale applications.
Explore reverse engineering and bug hunting techniques for KMDF drivers, focusing on entry points, IO queues, and implementation vulnerabilities. Gain practical skills for analyzing driver security.
Explore innovative approaches to SecOps in challenging business environments. Learn new security practices and research to effectively manage operations despite limited resources and organizational resistance.
Explore techniques for integrating automated security testing into the development process, enabling faster releases while maintaining a strong understanding of application risks.
Explore red teaming skills, career paths, and the Fortis open-source lab for simulating enterprise environments. Learn to transition from pen testing and develop advanced cybersecurity techniques legally.
Explore the UK's Code of Practice for IoT security, addressing password issues, vulnerability disclosure, and software updates. Learn about future challenges and potential certification methods.
Explore advanced ARM shellcode techniques, including overcoming cache coherency, polymorphic shellcode, egg-hunting, and polyglot shellcode. Demonstrations on IoT devices featuring different ARM architectures.
Explore the decade-long journey to bypass widely-used electronic locks without a trace, uncovering vulnerabilities in hotel security systems and their far-reaching implications.
Explore modern techniques for decrypting historical ciphers, including Enigma, ADFGVX, and Turning Grill. Learn about recent advancements and ongoing challenges in cryptanalysis of historical encryption methods.
Explore innovative hacking techniques using light and sound for C2 channels, exfiltration, and exploitation. Learn about bypassing security protections and defending against these novel attack methods.
Explore system firmware vulnerabilities and their impact on security. Learn about offline analysis of UEFI firmware updates to identify protection gaps and potential risks in modern systems.
Hands-on workshop introducing reverse engineering fundamentals for Windows malware analysis. Learn to set analysis goals, use tools, and apply computer science concepts through practical exercises.
Explore Software Defined Radio for hacking IoT devices. Learn digital signal processing basics and a reverse engineering workflow to recover and inject packets in proprietary wireless systems.
Detailed exploration of HiTag2 RFID technology, including authentication protocols and encryption. Implements and demonstrates academic attacks for key recovery and tag cloning.
Explore the evolving landscape of IoT security, challenging industry norms and emphasizing the need for new approaches to protect businesses and consumers in the interconnected world.
Get personalized course recommendations, track subjects and courses with reminders, and more.