Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how high-wattage IoT botnets can manipulate energy markets, impacting power grid demand and security. Learn about attack strategies, feasibility, and potential countermeasures.
Explore user misconceptions about end-to-end encryption in messaging apps and strategies to improve understanding, enhancing secure communication practices.
Explore advanced VBA macro attack techniques and defense strategies, including VBA Stomping and improved analysis tools like olevba, to address modern malware delivery challenges.
Systematic study reveals vulnerabilities in IoT cloud platforms' MQTT integration, exposing risks of device control, DoS attacks, data theft, and status manipulation.
Investigative journalist analyzes five high-profile hacking incidents, exploring trends and tactics in media manipulation and collaboration between hackers and reporters.
Explore the inner workings of a cybercriminal group operating an Android botnet, including their hierarchy, challenges, and impact on victims' security.
Explore frameworks for assessing U.S. cybersecurity policy effectiveness, focusing on measuring persistent engagement and deterrence strategies in national defense.
Strategies for maintaining an effective bug bounty program, focusing on incentives, communication, and researcher relationships to ensure high-value vulnerability reports and long-term success.
Explore NSA's journey in developing and open-sourcing Ghidra, a powerful software reverse engineering framework. Learn about its features, impact, and future developments.
Learn to protect your domains from phishing attacks using DNS and email security protocols like SPF, DKIM, and DMARC. Discover advanced techniques for detecting and preventing domain abuse.
Insights from experienced bug bounty managers on program operations, triage strategies, and common vulnerabilities. Learn best practices and avoid pitfalls for successful bounty programs.
Exploring the evolving landscape of Account Takeover (ATO) attacks, focusing on emerging threats, sophisticated techniques, and strategies to protect user accounts in the digital age.
Explore techniques to evade Linux EDRs, including using approved executables as decoys and leveraging dynamic ELF loader primitives for stealthy post-exploitation capabilities.
Explore Apple kernel vulnerabilities through fuzzing, including double free and out-of-bounds issues. Learn about debugging and fuzzing techniques for uncovering security flaws in Apple's core systems.
Explore templates for nation-level cyber attacks and defense strategies, examining various time horizons, attribution levels, and collective approaches to protect countries in cyberspace.
Get personalized course recommendations, track subjects and courses with reminders, and more.