Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how APT groups target Taiwan's media industry for cyber espionage, focusing on their tactics, motivations, and impact on daily activities and national security.
Explore Chrome WebSQL vulnerabilities and a mutation-based fuzzer for discovering SQLite bugs, enhancing web application security against remote attacks.
Explore advanced techniques for detecting stealthy sensitive information collection in Android apps, addressing challenges in privacy policy compliance and user data protection.
Explore critical vulnerabilities in privacy-focused webmail providers, including email theft and remote code execution, through CSS exploitation techniques in ProtonMail, Tutanota, and Skiff.
Explores how security advocacy should extend beyond professionals to all IT sectors and society, analyzing global security content and proposing improvements for broader impact.
Novel Wi-Fi attacks exploiting power-save mode to leak encrypted frames and disrupt networks. Explores vulnerabilities in AP frame buffering and encryption, demonstrating potential security risks in Wi-Fi implementations.
Explore techniques to combat distributed bot attacks using streaming-based outlier detection and SliceLine, generating effective rules for blocking malicious traffic at scale.
Exploring deep lateral movement in OT networks, focusing on TTPs for navigating through embedded device networks at the lowest levels, highlighting security vulnerabilities in industrial control systems.
Explore global data security trends, legislation, and industry-specific strategies. Gain insights into the evolving landscape of data protection and its impact across sectors.
Techniques for analyzing USB stack interactions to gather intelligence on embedded systems, including OS identification and vulnerability exploitation challenges.
Explore security risks of network-connected home devices, including potential for physical access and surveillance. Learn about vulnerabilities in smart locks and other IoT products.
Explore novel Ethernet attack techniques using affordable hardware and custom firmware. Learn about frame manipulations, SFD parsing anomalies, and Ethernet Packet-In-Packet injection for enhanced network security testing.
Practical guide on RFID hacking techniques, tools, and defenses. Learn to build custom long-range RFID hacking tools using Arduino, steal badge info, clone cards, and exploit vulnerabilities in proximity badge systems.
Explore SIM card vulnerabilities and their impact on mobile security. Learn about implementation flaws, potential exploits, and the implications for trusted computing in smartphones and embedded devices.
Exploring TLS truncation attacks to exploit web application flaws, demonstrating vulnerabilities in authentication systems and their impact on popular platforms like Helios, Microsoft Live, and Google.
Get personalized course recommendations, track subjects and courses with reminders, and more.