Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores prevalence and security impacts of payment credential leaks from mobile apps, revealing vulnerabilities in third-party payment systems serving billions of users globally.
Explore recent privilege escalation techniques in Windows services, focusing on methods attackers use to gain full system control from lower-privileged access.
Explore a novel exploit technique using elastic objects to bypass kernel protections like KASLR. Learn about this general approach, its implications, and potential mitigation strategies.
Visionary approach to cybersecurity: collaboration between hackers, government, and private sector to tackle threats. Insights on infrastructure protection, information sharing, and workforce development.
Uncover how operational security errors of a state-sponsored threat group revealed details of their entire operation, targeting high-profile individuals and compromising sensitive information.
Explore remote eavesdropping vulnerabilities in mobile messaging apps, focusing on the Group FaceTime bug and its implications for user privacy and application security.
Explore pressing InfoSec issues and future trends with Black Hat Review Board members in this insightful panel discussion, offering key takeaways for shaping future security strategies.
Strategies for building a diverse and inclusive security research team, highlighting successful approaches to gender equality and representation in the hacking industry.
Explore PDF vulnerabilities and learn how a single HTTP link can compromise PDF contents, exposing security risks in widely-used document formats and generators.
Uncover vulnerabilities in Nordic nRF52 SoCs through debug resurrection techniques. Learn about IoT security implications and potential exploits in these widely-used platforms.
Explore WebKit exploitation techniques for PlayStation 4, focusing on browser vulnerabilities as entry points for full-chain attacks. Learn about hardening challenges and cutting-edge exploit development.
Explore advanced techniques for fuzzing Windows 10 DirectX kernel, uncovering new attack methods and vulnerabilities in the rendering engine that powers the Windows platform.
Explore effective permissions and identity assumption in Google Cloud Platform to enhance security and prevent privilege escalation risks.
Explore LLVM compiler optimizations for undefined behavior, uncovering hidden bugs and security vulnerabilities in C/C++ programs through advanced static analysis techniques.
Explore OAuth token hijacking vulnerabilities in Google Cloud, understanding attack vectors and mitigation strategies for enhanced GCP environment security.
Get personalized course recommendations, track subjects and courses with reminders, and more.