Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the design of undetectable rootkits for Programmable Logic Controllers, uncovering vulnerabilities and potential threats to industrial control systems.
Explore the rise of ransomware as a disruptive force in cybersecurity, examining its unique characteristics, profit motives, and impact on the evolving landscape of digital threats.
Discover practical attacks on SSL VPNs, compromising corporate networks. Learn out-of-the-box security techniques, immediate mitigation strategies, and the vulnerabilities of Virtual Private Networks.
Explore techniques used by malware authors to prevent reverse engineering of Android native libraries, and learn strategies to overcome these anti-analysis traps.
Explore containerization's impact on offensive security operations, focusing on Docker's implications for penetration testing and application security in multi-container environments.
Uncover critical security vulnerabilities in trading technologies, including unencrypted data, DoS risks, and weak authentication. Learn about responsible disclosure and recommendations for safer trading practices.
Uncover hidden hardware backdoors in x86 CPUs, exploring their depth and implications. Learn about the feasibility of widespread hardware vulnerabilities and their potential impact on processor security.
Explore macOS firewall creation and vulnerabilities, covering kernel-level socket filtering, user-mode communication, secure installation, and self-defense mechanisms. Learn about firewall bypasses and potential weaknesses.
Strategies for community response to sexual harassment/assault incidents, focusing on survivor support, accountability, and bystander intervention. Explores leadership roles and community healing.
Explore advanced cmd.exe obfuscation techniques, including carets, quotes, and stdin argument hiding. Learn complex methods like string manipulation and novel encoding approaches for enhanced command-line security.
Debunking endpoint security buzzwords and hype. Practical insights on evaluating solutions beyond marketing claims, focusing on real-world effectiveness and meaningful metrics.
Explore remote exploitation techniques for Intel Management Engine, affecting most Intel-based systems since 2010. Learn about vulnerabilities and potential security risks in this critical subsystem.
Exploit chain to defeat Samsung KNOX security from zero privilege, bypassing KASLR, DFI, SELinux, and escalating privileges. Detailed vulnerabilities and mitigation bypassing techniques revealed.
Explore power law-based techniques for detecting and mitigating DDoS attacks, intrusions, and other malicious network activities using PEIMA methodology.
Explore automated RF signal identification techniques for monitoring diverse wireless technologies in organizational environments, enhancing security and management capabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.