Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how Intel SGX can be exploited to implement stealthy malware, extract secret RSA keys, and steal Bitcoins through cache attacks and other vulnerabilities in trusted execution environments.
Explore a novel ASLR bypass technique for 64-bit Linux systems using "return-to-csu", applicable to any application due to its use of silently attached code.
Explore how defenders can leverage graph-based thinking to strengthen security in domain environments, adapting to sophisticated attackers and enhancing prevention, detection, and investigation strategies.
Explore techniques for exfiltrating data from isolated industrial networks, including PLC-based methods, frequency manipulation, and passive monitoring. Learn about attack vectors and detection strategies.
Análisis detallado de vulnerabilidades de escape de máquinas virtuales VMware, explorando superficies de ataque, mecanismos RPC y casos de estudio de parches de seguridad recientes.
Learn to generate hunt hypotheses for effective threat hunting, focusing on token manipulation techniques and targeted data collection for improved cybersecurity analysis.
Explore Android's SafetyNet Attestation, its role in ecosystem security, and potential vulnerabilities. Learn about attack patterns, device integrity detection, and implementation challenges.
Explore vulnerabilities in GSMA's eUICC remote provisioning, revealing potential attacks that could disrupt mobile network operators' service delivery. Learn about SIM evolution and security implications.
Automate adversary emulation for network security using CALDERA. Replicate realistic post-compromise techniques, leveraging benign system functionality to enhance defensive strategies.
Explore Android kernel driver fuzzing with DIFUZE, a tool for identifying vulnerabilities in third-party driver code. Learn techniques to improve Android security infrastructure and discover potential weaknesses.
Explore CLKSCREW attack: software-based fault attacks exploiting energy management vulnerabilities, enabling security breaches without physical access to devices or specialized equipment.
Explore risks of connected healthcare devices, including attack surfaces, data vulnerabilities, and real-world case studies of medical IoT security breaches and their implications.
Detailed explanation of Intel Management Engine's flash file system, covering storage methods, supported file systems, and security features in ME 11.x.
Explore a novel web hacking technique that bypasses XSS mitigations using script gadgets. Learn about HTML sanitizers, CSP, and practical demonstrations of this powerful attack method.
Explore automated evasion techniques against machine learning-based malware detection, including AI-driven approaches and strategies for model hardening.
Get personalized course recommendations, track subjects and courses with reminders, and more.