Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncovers vulnerabilities in Siemens S7 PLC systems, demonstrating potential attacks on industrial control architectures despite claimed security measures and advanced cryptographic protocols.
Explore advanced command and control techniques, trust exploitation, and domain takeover in cloud environments. Learn about stealthy methods and new tooling for AWS, Azure, and GCP.
Exploring how cybersecurity practices evolve as companies become software-driven. Discusses cultural shifts in software engineering and their impact on security, emphasizing the need for integrated, cross-functional approaches.
Explore the emerging cyber arms race as countries develop new offensive weapons for the Internet, challenging the notion of a borderless digital world.
Explore zero-day vulnerabilities in BLE chips, allowing unauthenticated network penetration. Learn about BLEEDINGBIT, its impact on enterprise APs, and potential attack scenarios.
Uncover the SirenJack vulnerability affecting emergency warning systems, exploring how a simple setup can compromise critical infrastructure and discussing potential security implications.
Uncover a critical 4G LTE vulnerability allowing attackers to hijack calls and SMS. Learn about the 'Ghost Telephonist' attack and its implications for mobile network security.
Explore how acoustic waves can exploit vulnerabilities in MEMS sensors, causing smart devices to lose control and yield spoiled data.
Explore innovative honeypot adaptation for IoT security, addressing unique challenges and proposing intelligent interaction solutions to enhance protection of networked embedded devices.
Explore a novel data exfiltration technique exploiting cloud-enhanced antivirus sandboxes in highly secure enterprises, demonstrating vulnerabilities in seemingly protected systems.
Explore the Vulnerability Equities Process and its impact on software vulnerability disclosure, examining the likelihood of multiple parties discovering the same security flaws.
Explore comprehensive kernel protection against just-in-time code reuse attacks, focusing on memory corruption vulnerabilities and hardening techniques to prevent privilege escalation in kernel code.
Explore behavioral game theory in cybersecurity, examining human decision-making and its impact on defense strategies. Learn how empirical observations challenge traditional assumptions about rational behavior in InfoSec.
Exploring nation-state cyber-attacks on private Internet infrastructure, misaligned military incentives, and economic impacts. Discusses past efforts and current initiatives to address these challenges.
Explore techniques for auditing and defending serverless runtimes, focusing on AWS Lambda and Azure Functions, to enhance security in micro-service architectures.
Get personalized course recommendations, track subjects and courses with reminders, and more.