Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore user studies for security software, focusing on simulated attack scenarios to assess tool effectiveness and user behavior during threats.
Comprehensive recommendations for building secure penetration testing operations, including technical aspects, policies, procedures, and client communication strategies.
Explore design flaws in popular attack tools and techniques, and learn strategies for active intrusion prevention in this cybersecurity presentation from Black Hat.
Discover differential fuzzing for efficient cryptographic software testing, focusing on logic bugs rather than memory corruption. Learn principles, tools, and real-world applications.
Explore a novel approach to control networks through WSUS servers, bypassing limitations and potentially attacking air-gapped systems. Learn techniques, limitations, and protective measures.
Análisis de currÃculos de seguridad y acreditaciones frente a las necesidades de la industria, examinando su desarrollo, fuerzas que los moldean y soluciones propuestas para acreditar programas.
Unveils a novel, undetectable DMA attack exploiting DDR4 hardware vulnerabilities, enabling arbitrary memory access in live systems using a custom FPGA probe during sleep state.
Learn practical approaches to scale application security, implement effective tools, and build a successful program for securing numerous products simultaneously.
Explore FlowFuzz, a fuzzing framework for SDN switches using OpenFlow protocol. Learn about testing and securing software-defined networking infrastructure.
Explore data analytics and visualization tools for red team operations, enhancing pentesting capabilities through advanced consolidation and analysis techniques.
Comprehensive exploration of vulnerabilities in radiation monitoring devices through reverse engineering, RF analysis, and hardware hacking, revealing critical security flaws in nuclear industry equipment.
Uncover remote exploits in SQLite's memory corruption vulnerabilities, revealing potential attack surfaces across various applications using this widely-embedded database software.
Updating attack and defense strategies for cloud-based systems, focusing on interdependence and pivoting techniques. Covers DDoS, footprinting, exploitation, persistence, and more in AWS environments.
Explore malware analysis techniques using a custom C&C server for OSX/FruitFly. Learn to decode, monitor, and understand malware behavior for enhanced cybersecurity skills.
Explore advanced SS7 attacks and defenses using open-source firewall. Learn to trick attackers, reduce vulnerabilities, and enhance mobile network security against intelligence agencies.
Get personalized course recommendations, track subjects and courses with reminders, and more.