Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores the potential misuse of GPT-3 for large-scale disinformation campaigns, examining its capabilities to generate convincing fake news and the implications for society and information integrity.
Discover vulnerabilities in Windows PDB parser, learn exploitation techniques for privilege escalation, and explore the intricacies of memory corruption in DbgHelp.dll.
Explore database vulnerabilities through compression side-channel attacks, learning techniques to extract encrypted content and strategies for prevention and patching.
Explore cutting-edge program synthesis techniques for deobfuscation, focusing on intellectual property protection in mobile and embedded systems. Learn about latest advances and practical applications.
Explore real-world cases of large-scale cyber incidents, focusing on service and software provider compromises. Learn to adapt DFIR processes for global threats and improve incident visibility.
Explore novel techniques for lateral movement in segregated networks using unconventional command and control channels, enhancing penetration testing and attack simulation capabilities.
Explore a universal XAI translator to evaluate AI-powered security products, bridging research and practice for informed decision-making in the rapidly evolving field of AI security.
Explore vulnerabilities in HPE Gen10 servers' iLO5 management technology, focusing on the "silicon root of trust" and its implications for server security.
Explore eBPF's evolution from network monitoring to a powerful Linux kernel observability tool, its security implications, and potential misuse by attackers.
Explore advanced PCIe security threats targeting switches and Translation Layer Packets. Learn about novel attack vectors beyond traditional DMA exploits in high-bandwidth peripheral connections.
Explore 5G network security, baseband vulnerabilities, and remote code execution on smartphones through hands-on research, methodology, and live demonstrations.
Explore attack vectors in Big Data stack layers: ingestion, storage, processing, and access. Learn methodologies to identify vulnerabilities in complex infrastructures handling massive data volumes.
Explore Apple's U1 Ultra Wideband chip, its capabilities, and potential applications. Dive into firmware, kernel components, and user space modifications for this cutting-edge technology.
Explore a novel covert distributed execution technique for malware that challenges behavioral detection by AV and EDR solutions, using ROP-driven execution across multiple processes.
Explore systematic "robot teardown" to understand and repair robots, uncovering planned obsolescence practices and their implications for cybersecurity in robotics.
Get personalized course recommendations, track subjects and courses with reminders, and more.