Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover critical cryptographic flaws in iCloud Keychain's end-to-end encryption, potentially allowing attackers to access plaintext secrets through man-in-the-middle attacks on iCloud communications.
Explore vulnerabilities in wind farm control networks and potential attack scenarios, with insights on securing these critical renewable energy infrastructures.
Explore cyber warfare's complexities, including policy, strategy, and tactics. Gain insights into organizational structures and factors contributing to success in this evolving domain of conflict.
Explore JSON vulnerabilities, focusing on data libraries and serializers. Learn about attack vectors, classifications, and mitigation strategies for securing applications against JSON-based threats.
Explore techniques for detecting and exploiting logical vulnerabilities in Wi-Fi cryptographic handshake implementations, focusing on model-based testing and real-world examples.
Explore techniques to bypass Microsoft ATA's threat detection in Active Directory, covering reconnaissance, credential attacks, lateral movement, and persistence methods.
Explore creative techniques for detecting Exploit Kit infrastructure, including compromised websites, gates, and dedicated hosts, while understanding their underlying architecture.
Panel discussion on bug bounty programs: insights, challenges, and best practices from experienced program managers. Covers ROI, hunter interactions, and lessons learned for effective implementation and management.
Explore PKI redesign for IoT security, addressing key revocation, expiration, and rotation challenges. Learn from real-world experiences and discover innovative solutions for robust device management.
Explore incident response and threat intelligence with Palo Alto Networks' SVP Wendi Whitmore, discussing cybersecurity consulting, ransomware trends, and prevention strategies.
Explore mobile security threats, the evolving landscape, and Zero Trust principles in this insightful discussion on protecting mobile devices and data.
Explore automotive engine hacking, reverse engineering, and bypassing speed limiters in older vehicles. Gain insights into ECU communication, disassembly, and security vulnerabilities.
Explore BluePill, a customizable tool for neutralizing anti-analysis techniques in malware. Learn how it defeats evasive samples and executable protectors, enhancing malware dissection capabilities.
Explore weaknesses in deception technologies, learn tactics to overcome advanced techniques, and discover a new open-source tool for red teams to avoid traps during engagements.
Automated platform for macOS malware analysis, featuring kernel-level behavioral monitoring and extending Cuckoo sandbox capabilities. Supports various sample types and detects evasion techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.