Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncovers flaws in Android vendors' privacy dashboards, revealing how malicious apps can bypass monitoring and benign apps trigger false alarms. Explores implementation differences across top vendors.
Uncover the critical ChaosDB vulnerability in Azure Cosmos DB, allowing unauthorized access to thousands of customer databases. Learn about the discovery, exploitation, and implications of this unprecedented cloud security flaw.
Explore supply chain vulnerabilities in open source software, focusing on lockfile attacks. Learn offensive and defensive techniques to enhance project security.
Explores how knowledge shaming hinders cybersecurity progress, offering guidelines for effective knowledge sharing and consumption to foster a more secure and collaborative industry environment.
Uncover the tactics of a cyber mercenary operating in underground forums, exploring their global campaigns, targeting methods, and strategic operations from 2016-2021.
Explore practical attacks on attribute-based encryption, examining vulnerabilities in multi-authority schemes and their implications for cloud security and IoT applications.
Explore a novel attack on HSM digital signature verification, enabling execution of unsigned code in protected environments. Insights applicable to similar systems.
Comprehensive overview of stalkerware, its impact, and survivor-centric approaches to support victims, emphasizing trauma-informed practices and ethical considerations.
Explore action bias in cybersecurity, examining when immediate responses are beneficial or counterproductive, and learn strategies for effective decision-making during crises.
Explore vulnerabilities in NVIDIA vGPU, focusing on security risks in cloud infrastructures. Learn about potential VM escape techniques and their implications for AI, deep learning, and cloud gaming.
Explore Linux kernel tracing infrastructure and its impact on memory forensics. Learn about blind spots in defensive research and strategies to enhance detection of sophisticated attackers.
Explore Hyper-V vulnerabilities and attack interfaces, focusing on 3 RCE vulnerabilities in Microsoft's virtualization solution. Gain insights into cloud security and potential risks.
Explore advanced techniques for securing authentication systems against credential compromise, focusing on protecting core secrets and implementing multi-factor authentication for critical components.
Explore real-world examples of lawyer-security professional collaboration during security incidents, focusing on legal pitfalls and effective communication strategies.
Systematic tool for efficiently discovering live CnC servers using MITM approach, overcoming challenges of changing locations, proprietary protocols, and encryption in botnet communication.
Get personalized course recommendations, track subjects and courses with reminders, and more.