Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Kerberos delegation vulnerabilities in Windows networks, learning techniques for unauthorized impersonation and remote code execution. Gain insights into potential security risks and mitigation strategies.
Explore security unit testing for custom code, focusing on inoculating applications, identifying endpoints, and addressing common vulnerabilities through automated testing frameworks.
Explores DoS attacks on 4G cellular networks, revealing vulnerabilities in mobile communication systems and their potential for user tracking and manipulation. Discusses implications for security and privacy in telecommunications.
Explore data integrity attacks in industrial control systems, focusing on attacker perspectives and strategies for unauthorized access to control networks and equipment.
Explore a portable virtual device fuzzing framework using AFL to enhance VM security. Learn techniques for identifying vulnerabilities in virtual devices and preventing VM escape attacks.
Insightful discussion on critical InfoSec trends and their impact on future strategies, featuring industry experts at Black Hat Europe 2016's closing session.
Explore vulnerabilities in OAuth2.0 protocol when used for mobile app authentication, uncovering potential security risks in Single-Sign-On services for billions of users.
Explore fine-grained Control-Flow Integrity for Linux kernel security, addressing ROP attacks and dynamic kernel modules. Learn advanced mitigation techniques and implementation challenges.
Explore USB/IP vulnerabilities in Linux, including buffer overflow and data injection. Learn about architecture, protocol, and security implications of this USB device sharing framework.
Explore key cybersecurity insights from Black Hat Asia 2017, covering topics like attacker specialization, machine learning, digital nations, and biometrics.
Explore deep learning-based antivirus technology with low false positive and negative rates, already in production since 2016. Learn about AI's potential to revolutionize cybersecurity.
Explore PDF vulnerabilities, efficient fuzzing techniques, and attack surface analysis to uncover 100+ CVEs in a year, with statistical insights on security weaknesses.
Explore SafeStack's vulnerabilities and potential bypasses in Clang compiler, analyzing implementation weaknesses and demonstrating practical exploitation techniques for memory corruption.
Explore new attacks on HTTP/2, the emerging Internet protocol. Learn about vulnerabilities, implementation flaws, and potential mitigations in this cutting-edge cybersecurity analysis.
Explore Android plugin technology's security risks and learn defensive strategies to protect your app from unauthorized loading and execution as a plugin.
Get personalized course recommendations, track subjects and courses with reminders, and more.