Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Innovative method for hardware hacking using connection matrix, enabling arbitrary analog-alike connections and versatile bus interfacing for comprehensive hardware exploitation.
Explore counter-forensic techniques to safeguard image-based intelligence from exploitation attacks, addressing current and emerging threats in visual asset protection.
Learn techniques for bypassing electronic door locks, exploring vulnerabilities and hacking methods used in popular media depictions of cybersecurity.
Explore email vulnerabilities and domain name collisions as potential security threats, focusing on protecting email accounts from advanced persistent threats and exploitation techniques.
Explore the mobile-telephony cybercrime ecosystem in Asia through a 7-month honeypot study, revealing SMS scams, fraudulent calls, and VoIP phishing attempts. Gain insights into real threats facing mobile users.
Explore model-based testing techniques to detect logical bugs in SSL/TLS and Wi-Fi implementations, enhancing network protocol security and implementation.
Explore how machine learning can combat Business Email Compromise scams, a sophisticated threat that has cost organizations billions in losses through fraudulent wire transfers.
Explore a new paradigm for integrating development teams with offensive and defensive teams to enhance software security throughout the development lifecycle, fostering knowledge sharing and strengthening defenses.
Explore hypervisor-based kernel protection, its limitations, and the need for higher-privilege solutions like Shadow-Box to combat rootkits and kernel exploits effectively.
Explore advanced hacking techniques using Microsoft-signed tools, including PowerShell and debuggers, to achieve various attacks and persistence on Windows systems.
Explore techniques to bypass Control Flow Guard in Windows using big data analysis, focusing on unguarded gates and indirect branches for enhanced security understanding.
Insights on designing and securing enterprise networks under constraints, drawing from Black Hat's network experiences. Covers evolution, challenges, and future directions in network management.
Explore cryptographic secret handshakes for mobile devices using Bluetooth LE, enabling mutual authentication between untrusted parties in virtual secret communities.
Explore advanced techniques to mitigate BREACH attacks in web applications using compression and encryption. Learn about Context Hiding and its implementation in practical scenarios.
Explores Linux BPF JIT compiler vulnerabilities, demonstrating how randomization fails to prevent JIT spray attacks and proposing mitigations for enhanced kernel security.
Get personalized course recommendations, track subjects and courses with reminders, and more.