Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore passive fingerprinting techniques for HTTP/2 clients, analyzing millions of connections to extract unique user agent fingerprints across various implementations.
Practical approach to enhance DBI tools' stealth and resilience against anti-instrumentation attacks, improving malware analysis and evasion detection techniques.
Explores mathematical backdoors in encryption algorithms, discussing design, detection, and implications for cryptographic trust and control. Examines historical cases and future challenges in algorithm security.
Revealing how VoIP software can leak keystroke information through audio, compromising user privacy. Presents S&T tool to demonstrate vulnerability in popular platforms like Skype and Google Hangouts.
Explore the limitations of Intel SGX Remote Attestation for ensuring confidentiality and integrity of unmodified cloud applications.
Explore how combining SIGINT and HUMINT enhances threat intelligence, providing deeper insights into adversary tactics, intent, and vulnerabilities for improved cybersecurity decision-making.
Explores how data quality impacts machine learning models for malicious URL detection, comparing results across different datasets and analyzing feature activations in neural networks.
Detailed exploration of Tesla's security vulnerabilities, from wireless attacks to CAN bus access, including Tesla's response and new mitigation strategies.
Explore methodologies for quantifying software security risks, predicting vulnerabilities, and evaluating consumer products using the Digital Standard developed by Consumer Reports and CITL.
Explore power grid vulnerabilities, live demo of feeder relay exploitation, and mitigation strategies. Learn about securing critical infrastructure and the responsible disclosure process.
Exploring JavaScript's unique features and how they lead to vulnerabilities in various software, including Flash, Chrome, Edge, and Safari. Insights for developers and security researchers.
Explore techniques for leaking and bypassing antivirus detection models, including APK perturbation, model leaking, and auto-bypassing processes. Gain insights into commercial AV weaknesses.
Explore the rise of firmware vulnerabilities in recent years, their impact on system security, and the challenges in mitigating these threats in BIOS/UEFI environments.
Explore the impact of The Shadow Brokers' leaks on cybersecurity, examining sophisticated nation-state tools and the evolving landscape of cyber fear as a geopolitical instrument.
Discover a formal method for detecting protocol implementation vulnerabilities in closed-source network devices, focusing on OSPF in routers, without accessing source code or binaries.
Get personalized course recommendations, track subjects and courses with reminders, and more.