Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover a technique to conceal malicious payloads in Android packages, manipulating encrypted data to appear as genuine images while evading detection and reverse engineering attempts.
Automated iOS app security assessment tool SIRA demonstrated, revealing common flaws in AppStore products. Explores risks, testing methods, and future improvements for mobile app security.
Explore corporate information security law fundamentals, legal frameworks, and compliance strategies for protecting sensitive data and mitigating cyber risks in business environments.
Explore supply chain risks, their consequences, and industry mitigation strategies in light of recent challenges. Gain insights into software integrity and future security measures.
Explore strategies for securing big data environments, focusing on Hadoop. Learn about control frameworks, data protection techniques, and effective risk management for sensitive information.
Explore vulnerabilities in building access control and facility management systems, uncovering potential security risks and exploitation techniques.
Explore dynamic binary instrumentation techniques for tackling obfuscated Android app code, aiding reverse engineers in overcoming anti-analysis protections.
Explore a new exploitation technique for Use-After-Free vulnerabilities, focusing on SLUB and BUDDY allocators to improve efficiency and success rates in physical page reuse and Android rooting.
Explore GPU hacking techniques and vulnerabilities in Android device drivers, focusing on rooting methods and security implications for mobile systems.
Explore WebAssembly VM architecture, attack surfaces, and fuzzing strategies. Learn about bug discovery across multiple projects using various fuzzing techniques and frameworks.
Novel vulnerabilities and exploitation techniques to bypass Linux syscall tracing, even with security measures like seccomp, SELinux, and AppArmor in place. Demonstrates how user-mode programs can evade detection.
Explore in-the-wild Android exploits discovered by Google's TAG and Android Security teams, including deep dives into CVE-2021-0920 and novel kernel exploitation techniques for bypassing hardware mitigations.
Unveiling vulnerabilities in ESP32-V3 microcontrollers through hardware security evaluation, focusing on extracting firmware encryption keys to decrypt flash content containing potential secret data.
Explore Azure AD external identities, their vulnerabilities, and potential exploitation methods for backdooring and hijacking accounts in this informative cybersecurity presentation.
Discover techniques for automatically extracting network protocol specifications from binary code, useful for security analysis, bug finding, and understanding botnet communications.
Get personalized course recommendations, track subjects and courses with reminders, and more.