Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring challenges in cyberspace governance, including insufficient awareness among communities, international security dialogues, and the struggle to address war and peace issues in the digital realm.
Explore how malicious Chrome extensions can create botnets, distribute themselves, and exploit vulnerabilities. Learn about attack patterns, extension capabilities, and security measures.
Discover the dangers of BlueBorne, a new airborne attack method that can remotely compromise Linux and IoT devices. Learn about zero-day exploits, their impact, and how to protect against these threats.
Explore advanced techniques for evading and disabling Windows Defender ATP, including post-breach tools and behavior analytics. Gain insights into Red Team strategies for bypassing enterprise security measures.
Explore zero-day vulnerabilities and exploits through rare data analysis, revealing insights on their lifecycle, development, and implications for cybersecurity and policy.
Discover how key reinstallation attacks exploit WPA2 vulnerabilities, compromising network security. Learn about attack techniques, impacts, and countermeasures for better protection.
Explore security approaches from trusting everything to distrusting nearly all components. Learn about innovative techniques for system protection and data leak prevention.
Explore the evolving landscape of international cyber diplomacy, focusing on efforts to counter threats, promote norms, and address challenges in cyberspace from a policy perspective.
Explore hardware vulnerabilities in AES-encrypted USB devices through an audit of multiple keys and hard drives, revealing if they truly secure data as claimed.
Explore Docker API vulnerabilities leading to remote code execution, same-origin bypass, and hypervisor persistence via shadow containers. Gain insights into containerization security risks and mitigation strategies.
Explore trust relationships in business, analyzing vulnerabilities and exploitation techniques. Learn to identify, manage, and secure critical trust points in code, platforms, and organizational structures.
Explores vulnerabilities in autonomic networks, focusing on Cisco's "Plug and Play" routers. Analyzes protocols and potential security risks in automated network systems.
Explore notorious command and control toolkits used in targeted attacks, learn about their vulnerabilities, and discover techniques to exploit and defend against these sophisticated threats.
Explore potential security risks of Office365 adoption and learn how malicious actors can exploit these vulnerabilities for covert command and control using PowerShell in enterprise environments.
Explore vulnerabilities in industrial robots, their embedded controllers, and network connections. Learn about potential security risks in modern factory automation systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.