Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques to bypass ASLR, DEP, and CFG exploit mitigations in Microsoft Edge on Windows 10, even with arbitrary address read/write capabilities.
Explore IoT security vulnerabilities, bug hunting techniques, and exploit methods. Learn to identify and address risks in everyday connected devices for improved cybersecurity.
Learn offensive techniques to enhance your organization's cyber defense against advanced, targeted attacks from security experts Itai Grady and Tal Be'ery.
Explore techniques for auditing and bypassing Web Application Firewalls using automata learning, with a focus on code injection attacks and grammar-oriented filter auditing.
Explore how attackers can exploit Rowhammer vulnerabilities to compromise VM isolation, demonstrating practical attacks on OpenSSH and discussing implications for cloud security.
Explore Android rooting techniques, from kernel vulnerabilities to exploitation, addressing challenges like SELinux enforcement and limited attack surfaces in modern devices.
Explore innovative web scanning techniques to detect unknown injection vulnerabilities, moving beyond traditional payload-based methods for more comprehensive security testing.
Visualizing online counterfeiting networks through passive DNS analysis, revealing cybercriminal strategies and providing insights for law enforcement to combat digital fraud.
Explore control-flow integrity implementation challenges, focusing on security and practicality. Learn about code-reuse attacks, randomization, and hardware-based solutions for robust CFI.
Explore HTTP Adaptive Streaming vulnerabilities in Chrome, focusing on YouTube's DASH implementation and potential privacy risks through traffic analysis and machine learning techniques.
Explore advanced techniques for detecting and analyzing malware using machine learning, big data, and network analysis to stay ahead of evolving cyber threats.
Streamline incident response with automation, reducing reliance on specialized skills. Learn to build an investigation engine, leverage ontologies, and enhance operational efficiency.
Explore techniques to manipulate analog-to-digital converters, focusing on signal processing methods to deceive industrial control systems and embedded devices. Learn potential vulnerabilities and their implications.
Explore patterns of cyber criminal activity in underground forums, analyzing behavior across clear, deep, and dark web platforms to understand hacker communities and their focus areas.
Explore vulnerabilities in Android chipsets, focusing on Qualcomm's role in mobile security. Learn about recent issues and Google's responses to tighten Android's fragmented ecosystem.
Get personalized course recommendations, track subjects and courses with reminders, and more.