Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for recovering deleted VSS snapshots in Windows, crucial for computer forensics and file restoration. Learn about snapshot management, data structures, and practical demonstrations.
Explore advanced kernel mode threats, Microsoft's defenses, and practical strategies for detecting and mitigating sophisticated attacks on Windows operating systems.
Comprehensive exploration of security vulnerabilities in industrial control gateways, from protocol attacks to firmware reverse engineering, with live demonstrations on real devices.
Explore limitations of machine learning in cybersecurity, dangers of blind algorithm application, and alternative approaches like probabilistic inference for more effective threat detection and analysis.
Explore vulnerabilities in SAML-based SSO systems, focusing on XML signature attacks. Learn about potential exploits, threat models, and remediation strategies for securing identity management.
Explore the undocumented Windows Notification Facility, its architecture, and potential security implications. Learn about state names, data publishing, and consuming, as well as attack vectors and defensive strategies.
Explore Hyper-V architecture, vulnerabilities, and security implications in virtualization technology. Gain insights into guest-to-host exploits and platform security challenges.
Explore challenges and solutions in operationalizing a Security Operations Center, covering threat hunting, behavioral analytics, and rapid product deployment for enhanced cybersecurity.
Explore Meltdown, a critical security vulnerability that breaks fundamental isolation between user applications and operating systems, allowing unauthorized access to system memory and sensitive data.
Explore JIT compiler security in JavaScript engines, focusing on challenges, solutions, and potential vulnerabilities. Learn about optimization techniques and their impact on browser exploitation.
Novel side-channel attacks on mixed-design chips exploiting electromagnetic leaks in radio signals, potentially breaking cryptography over large distances. Explores discovery, impact, and countermeasures.
Discover XOM-switch, a security tool enabling XOM on Linux applications using PKU. Learn about its end-to-end approach for protecting deployed apps without source code or heavy binary rewriting.
Explore a new SSRF exploit technique targeting URL parsers in popular programming languages. Learn about protocol smuggling, fuzzing tools, and discover vulnerabilities in widely-used libraries.
Dissection of QNX's security features, including exploit mitigations and random number generators, for embedded systems in automotive, industrial, defense, and medical sectors.
Explore security challenges and solutions for next-gen wearables, focusing on a custom Security Development Lifecycle for hardware, software, and cloud components in IoT ecosystems.
Get personalized course recommendations, track subjects and courses with reminders, and more.