Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore GDPR compliance challenges for third-party JavaScript, examining privacy implications and potential solutions for data protection in web development.
Análisis detallado del malware Industroyer utilizado en el ciberataque a la red eléctrica de Ucrania en 2016, sus capacidades y el grupo de amenazas detrás del ataque.
Explore UEFI firmware security, vulnerabilities, and real-world applicability of attacks. Analyze rootkit scenarios and assess practical implications for system compromise at privileged levels.
Discover 24 techniques for gathering threat intelligence and tracking actors, illustrated with 30 real-world cases. Learn about crimeware vulnerabilities, C&C misconfigurations, and underground marketplaces.
Explore Go language runtime vulnerabilities, their impact on applications, and potential security risks in this in-depth analysis of Golang's growing adoption across various programming domains.
Explore OpenQuantumSafe, an open-source library for quantum-safe cryptography, including implementations, benchmarks, integration challenges, and future developments.
Explore practical cache covert channels in cloud environments for secret data exfiltration between isolated virtual machines, presented by security researchers at Black Hat Asia.
Explore CANToolz framework for CAN bus analysis, featuring black-box testing of automotive networks and ECUs. Learn practical use-cases for vehicle security research and penetration testing.
Explore fault injection techniques to bypass Secure Boot in embedded systems, focusing on hardware-based attacks when logical vulnerabilities are absent.
Explore Pegasus, a sophisticated mobile espionage tool, its technical capabilities, and real-world impact. Learn about infrastructure tracking and malware detection in high-profile attacks.
Explore advanced file format fuzzing techniques for vulnerability hunting, including setup, scalability, and achieving optimal results against modern software.
Explore techniques to protect your digital privacy and evade metadata analysis in an era of pervasive surveillance by governments and corporations.
Explore the importance of foundational security skills and an adversarial mindset in navigating diverse InfoSec roles, from forensics to red teaming, in this insightful keynote by Amanda Rousseau.
Explore generic attacks on encrypted databases supporting range queries, focusing on common building blocks and latest solutions in commercial and academic settings.
Insider perspective on cyber insurance: company assessments, pricing, claims, and industry evolution. Gain insights into how insurers evaluate and manage cyber risks.
Get personalized course recommendations, track subjects and courses with reminders, and more.