Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore innovative attack vectors in industrial control systems, focusing on exploiting physical processes to bypass security measures and deliver malicious payloads.
Explore attack surfaces of hypervisors and TrustZone monitors in ARM-based phones, focusing on Google Nexus and Pixel devices. Learn about attack scenarios and interactions between privilege levels.
Comprehensive analysis of Electron's security model, isolation mechanisms, and vulnerabilities in Electron-based applications. Explores IPC messaging, preloading, and design weaknesses.
Explore strategies for influencing security stakeholders through cyber wargaming, including technical architecture, business value, and lessons learned from real-world implementations.
Explore rVMI, a powerful platform combining VMI and Rekall for interactive malware analysis, operating from the hypervisor with advanced event control capabilities.
Explore a novel SSRF exploit technique targeting URL parsers in popular programming languages. Learn about vulnerabilities in Python, PHP, Java, and more, uncovering inconsistencies between parsing and requesting.
Explore realistic adversary simulations and organizational responses through purple team exercises to enhance SOC and IR team effectiveness and maturity.
Explore the security implications and threat model of serving third-party JavaScript across the web, with insights for startups building enterprise products.
Explore MQTT protocol vulnerabilities, SQL database attacks, and new device discoveries. Assess current security landscape and global response to previous findings in IoT and connected systems.
Explore legal aspects of cybersecurity contracts, including risk allocation and service agreement formation, to effectively protect client data and navigate professional responsibilities.
Explore FTC regulations on deceptive advertising in security product marketing. Learn to avoid violations and create compliant, ethical promotional strategies.
Explore firmware vulnerabilities in UEFI, Mac EFI, and Coreboot, and learn about potential stealth implants that can bypass modern OS defenses.
Learn about the takedown of Avalanche, a secure server infrastructure used for cybercrime. Explore the investigation, challenges, and international cooperation in dismantling this network that caused massive financial losses.
Unveiling vulnerabilities in 3G/4G networks, introducing novel attack vectors for user tracking and monitoring, and discussing potential privacy implications for mobile users worldwide.
Explore the potential physical safety risks of IoT devices being repurposed for malicious attacks, going beyond known cybersecurity threats to examine real-world dangers.
Get personalized course recommendations, track subjects and courses with reminders, and more.