Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how legacy components in Windows 10 can harbor decades-old vulnerabilities, focusing on printer drivers and their potential security implications.
Explore the process and techniques of jailbreaking iOS 13, including kernel vulnerabilities and unauthorized code execution, presented by an expert at Black Hat conference.
Discover automated static analysis techniques for identifying UEFI firmware vulnerabilities at scale, addressing the lack of systemic approaches in x86-based systems research.
Explore evidence-based trust in hardware through the Precursor platform, challenging faith-based approaches and proposing new methods for verifiable hardware security.
Explore the structure, principles, and detection methods of spy cameras in this informative talk on combating hidden surveillance devices.
Explore Kerberos vulnerabilities in Active Directory forest trusts, revealing how attackers can breach trust boundaries in enterprise environments with multiple AD forests.
Explore HTTP Alternative Services header vulnerabilities and potential exploits, including load balancing manipulation and client segmentation attacks.
Explore vulnerabilities in contactless payment systems, examining protocols and potential security risks in this comprehensive analysis of NFC technology.
Learn to design and operate a realistic industrial control system honeypot, exploring technical aspects and industrial automation processes for enhanced cybersecurity.
Explore DNS vulnerabilities and attacks, examining the protocol's critical role in internet traffic and its ongoing security challenges as IPv6 adoption grows.
Explore container security, focusing on shared kernel vulnerabilities that may allow processes to escape and compromise the host system. Learn about potential risks and mitigation strategies.
Explore Wi-Fi driver vulnerabilities and security issues before password authentication, uncovering potential threats and expanding attack surfaces in wireless networks.
Explore TPM vulnerabilities and their impact on BitLocker encryption, uncovering potential security risks in widely-used commercial devices.
Singapore's approach to national cybersecurity, drawing lessons from cars and sanitation to build a Smart Nation and challenge traditional security paradigms.
Insightful discussion on pressing InfoSec issues by Black Hat Review Board members, highlighting key takeaways and conclusions from the conference's second day.
Get personalized course recommendations, track subjects and courses with reminders, and more.