Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to maximize your threat intelligence program's value, enhancing security across teams with practical strategies for effective adversary detection and intel utilization.
Novel attack method against Node.js platform using hidden property abusing. Explores vulnerabilities in JavaScript data exchange to tamper with critical program states in server-side applications.
Análisis de la evolución y vulnerabilidades de la autenticación de punteros del kernel de iOS, con demostraciones de nuevos métodos para eludir la seguridad en iOS 13.3.
Learn to detect and understand 4G/LTE IMSI-catchers, explore their capabilities, and discover software solutions for identifying fake base stations. Gain insights into cell network security improvements.
Explore advanced techniques for emulating and analyzing kernel rootkits, enhancing cybersecurity defenses against high-privilege malware operating at the OS level.
Explore the enduring security risks in Windows Print Spooler service, a decade after Stuxnet's infamous exploit, and learn about current vulnerabilities in printing systems.
Explore how TLS features can be exploited for attacks, focusing on Server-Side Request Forgery. Learn about a novel, cross-platform method to leverage TLS for targeting internal services.
Explore techniques for detecting and responding to malicious activity disguised as legitimate use in cloud platforms. Learn to identify and mitigate abuse scenarios that bypass traditional security measures.
Explore how cybercriminals exploit public standards to conduct ATM fraud through INJX_Pure and Lazarus FASTCash malware, showcasing their programming skills and understanding of financial transactions.
Uncovers a decade-long, state-sponsored cyber espionage campaign targeting Linux servers, revealing custom malware and rootkits used in strategic attacks on government and industry infrastructure.
Experimental exploration of satellite broadband vulnerabilities using affordable equipment. Demonstrates eavesdropping techniques across land, air, and sea communications with minimal detection risk.
Explore practical methods to exploit Ethernet packet-in-packet attacks, bypassing firewalls and NAT solutions. Learn how attackers can establish man-in-the-middle positions to eavesdrop on corporate communications.
Explore reverse engineering techniques to bypass protections and expand functionality of embedded mobile chipsets, going beyond traditional rooting methods for complete device control.
Uncovers vulnerabilities in Trusted Platform Modules through timing analysis, revealing potential security risks in hardware-based cryptographic systems used across various computing platforms.
Analysis of APT attacks on semiconductor industry, focusing on Taiwan. Explores threat actors, campaigns, and security status, highlighting potential global supply chain impacts.
Get personalized course recommendations, track subjects and courses with reminders, and more.