Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore open-source tools demonstrating vulnerabilities in Apple Pay, including methods for unauthorized transactions and card reconnection, even on non-jailbroken devices.
Unveiling vulnerabilities in Korea's transit card system through side-channel attacks, demonstrating potential financial risks and the need for enhanced smartcard security measures.
Explore real-world payloads used by attackers exploiting major vulnerabilities, based on CloudFlare's unique insights from protecting millions of websites.
Explore IoT device security challenges, cyber hygiene importance, and active management strategies. Gain insights from HP's framework for print security assessments and industry best practices.
Discover how to implement a holistic, integrated threat intelligence approach that combines cultural shifts and technological enhancements for proactive cybersecurity.
Learn essential cybersecurity strategies from AlienVault's CTO. Discover the importance of mastering security basics, effective breach detection, and data sharing for improved threat response across organizations.
Análisis de vulnerabilidades en la generación de tokens de Samsung Pay, explorando posibles fallos de seguridad y riesgos para los usuarios.
Explores detection of malicious documents by identifying deviations from file format specifications, focusing on targeted email attacks in Japan and introducing the o-checker tool for high detection rates.
Explore strategies for automating incident response processes in large-scale environments to improve efficiency, visibility, and organizational protection.
Discover Iron Crow: a powerful tool for Android BSP developers and OEMs to detect platform-level vulnerabilities, enhancing security and protecting end users from potential exploits in customized Android environments.
Learn to simulate networks for malware analysis using FakeNet 2.0. Capture network signatures, mimic protocols, and defeat malware through hands-on challenges with real-world samples.
Explores vulnerabilities in Android apps and ad libraries, demonstrating a targeted attack method that exploits location data and system weaknesses to compromise user privacy and device security.
Explore techniques for detecting vulnerabilities in virtual devices using conformance testing, enhancing security in virtualized environments.
Explores memory access issues in multi-threaded environments, focusing on compiler/hardware behaviors that can lead to security vulnerabilities in OSes, VMs, and applications.
Explore a novel DNS attack allowing adversaries to maintain revoked malicious domains, affecting mainstream DNS software and public resolvers. Learn about vulnerabilities in domain name delegation processes.
Get personalized course recommendations, track subjects and courses with reminders, and more.