Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how new security measures in Chrome can be exploited to bypass the sandbox and compromise user privacy, revealing potential vulnerabilities in browser protection mechanisms.
Explore graph convolutional networks for detecting suspicious communication pairs in industrial control systems, enhancing security monitoring beyond traditional whitelisting methods.
Explore IKEv2 attack surface through header chaining, uncovering vulnerabilities in IPsec VPNs. Learn techniques for identifying and exploiting weaknesses in Internet Key Exchange implementations.
Practical exploration of fingerprint authorization vulnerabilities in Android apps, demonstrating attack techniques and suggesting mitigation strategies for developers.
Explore how lasers can manipulate voice-activated IoT devices, revealing potential security vulnerabilities in smart home technology and microphone systems.
Explore security vulnerabilities in app-in-app paradigms for Android and iOS, focusing on mini-programs' design flaws and potential risks to user privacy and data protection.
Explore SSD data recovery techniques, uncovering hidden management methods and confidential controller information to maximize chances of retrieving lost data from solid-state drives.
Explore quantum cryptography beyond basic qubit exchange, delving into exotic applications and quantum effects for securing information that traditional cryptography cannot achieve.
Explore new timing attacks for hypervisor detection, crucial for sandbox evasion in malware analysis. Learn about hardware-assisted virtualization vulnerabilities and low-level measurement techniques.
Explore the evolving sophistication of ransomware operations, focusing on European targets, attack strategies, and the lifecycle of Rival ransomware. Learn about emerging trends and future threats in cybersecurity.
Unveils a novel attack exploiting PCIe bus vulnerabilities to reconstruct DNN models in AI privatization scenarios, discussing challenges, techniques, and countermeasures.
Unveiling critical zero-day vulnerabilities in layer 2 protocols, demonstrating their impact on enterprise device and network security, and exploring potential exploitation techniques.
Explore Windows Event Log for efficient adversary detection, leveraging automation and MITRE ATT&CK framework to enhance cybersecurity monitoring and response capabilities.
Insightful discussion on pressing InfoSec issues, including COVID-19 impact, security breaches, misinformation, and digital asset protection, featuring Black Hat Review Board members.
Explore biometric data usage, privacy legislation, and implications in APAC and globally. Learn about government and private sector practices, legal frameworks, and individual rights regarding biometric information.
Get personalized course recommendations, track subjects and courses with reminders, and more.