Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Bedtime story-style guide for cybersecurity professionals on conducting threat hunts. Covers five essential hunts to find bad actors and improve organizational security.
Explore the Hourglass Model 2.0 framework for gathering security intelligence on underground marketplaces, focusing on 2FA abuse in Southeast Asia and its implications for threat prevention.
Unveiling recent APT campaigns targeting financial institutions, including banks, ATM companies, and Bitcoin exchanges, with insights on malware, vulnerabilities, and attack vectors.
Uncover a chosen-plaintext attack on Windows authentication, exploiting a vulnerability in common protocols. Learn about the attack's mechanics, implications for network security, and mitigation strategies.
Explore security challenges and solutions for large-scale datacenter orchestration platforms like Kubernetes, Mesos, and Docker, focusing on cloud-scale infrastructure and software-defined datacenters.
Explore firmware extraction techniques using affordable SD card readers, bypassing expensive tools and complex setups for efficient hardware hacking and analysis.
Explore OpenCrypto, a library enabling full utilization of JavaCard capabilities across vendors. Learn about cryptographic coprocessors and ecosystem advancements in smart card technology.
Innovative file system solution to combat ransomware attacks, offering preventive and reactive security measures beyond traditional detection approaches for enhanced data protection.
Explore the Web Cache Deception attack, a new vector exposing sensitive user data through server and caching manipulation. Learn about risks, conditions, and mitigation strategies.
Practical tips for adapting application security to modern DevOps practices, covering static analysis, dynamic scanning, and security visibility for rapid development cycles.
Explore large-scale 3G/4G intranet scanning techniques and their application in detecting the WormHole vulnerability across millions of mobile devices in China's major ISPs.
Learn best practices for building a robust document analysis pipeline to detect malicious content, covering file type detection, sandboxing, content inspection, and evasion techniques used by attackers.
Explore advancements in targeted attacks and lateral movement techniques, examining their impact on cybersecurity and potential parallels to the Industrial Revolution.
Discover how VMware's API can be exploited to escalate insider threats, bypassing security measures that separate infrastructure and guest machine domains in enterprise environments.
Explore Android's attack surface reduction strategies, their impact on security, and future improvements. Gain insights into technical approaches and specific bug mitigation in this comprehensive overview.
Get personalized course recommendations, track subjects and courses with reminders, and more.