Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore PostgreSQL vulnerabilities in cloud services, including isolation issues and potential cross-account access attacks. Learn about real-world impacts and recent demonstrations of database security flaws.
Explore macOS security vulnerabilities through process injection, revealing how a single flaw can compromise multiple security layers and impact user data protection.
Explores vulnerabilities in Bluetooth Mesh networks, analyzing protocols, demonstrating attack surfaces, and introducing a BLE Mesh Fuzzer. Includes real-world cases and security recommendations.
Explore techniques for circumventing text-based 2FA using OSINT, phishing, and burner phones. Learn to connect leaked credentials with likely 2FA phone numbers from public sources.
Explore Chrome's sandbox security, focusing on Mojo IPC services as potential targets for sandbox escapes. Learn about vulnerabilities and exploitation techniques in browser security.
Novel fuzzing approach for deterministic discovery of race condition bugs, enabling researchers to unearth and root cause serious concurrency issues while maintaining an enjoyable process.
Explore systemic issues in security patches, their impact on enterprise security, and strategies to improve vendor servicing habits. Learn to interpret advisories and prioritize risk management.
Unveils a novel time-agnostic replay attack on automotive remote keyless entry systems, exploiting vulnerabilities in rolling code implementations to gain unauthorized vehicle access.
Explore the security vulnerabilities of SpaceX Starlink's User Terminal through black-box hardware evaluation, revealing how voltage fault injection can bypass firmware signature verification.
Uncover novel attack vectors in Electron framework, leading to remote code execution in popular desktop apps despite security measures. Explore vulnerabilities in Discord, Teams, VSCode, and more.
Explore Kerberos authentication protocol's inner workings, focusing on local machine security implications and privilege escalation vulnerabilities in Windows enterprise networks.
Explore TruEMU, an open-source iOS emulator enabling complete kernel emulation, including SecureROM and USB stack. Learn about its advantages, implementation, and potential for security research and analysis.
Explore an optical side-channel attack that recovers sound from reflective objects, revealing potential vulnerabilities in home office settings during remote work.
Explore a critical vulnerability in ZKP PLONK implementation, allowing forged proof creation. Learn how theory guides the attack and its practical execution through software vulnerabilities.
Uncover hidden macOS vulnerabilities by analyzing existing bug reports. Learn to spot overlooked security issues and improve your vulnerability detection skills for Apple's operating system.
Get personalized course recommendations, track subjects and courses with reminders, and more.