Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore directed fuzzing techniques for targeted vulnerability detection, focusing on bug reproduction and patch-oriented testing to uncover complex and silent software flaws.
Explore the security implications of remote access solutions and VPNs for enterprise mobile workforces, examining potential vulnerabilities and challenges.
Explore AMD's Platform Security Processor: its role in system bootstrapping, security features, and proprietary nature. Gain insights into this embedded ARM core within x86 CPUs.
Explore vulnerability research on the Microchip ATECC508A secure memory, examining laser fault injection techniques to bypass cryptographic authentication in IoT devices.
Explore container escape techniques and new sandboxing tools using unikernels, lightweight VMs, and userspace-kernels to enhance isolation between host and container OS.
Dive deep into PDF's insecure features and vulnerabilities, exploring malicious capabilities affecting major viewers through systematic analysis and in-depth examination.
Explore a Safari exploit chaining six vulnerabilities to compromise the macOS kernel. Learn about offensive security research and browser-based kernel exploitation techniques.
Exploración de vulnerabilidades en el arranque seguro de Samsung S10, analizando el manejo de solicitudes USB en S-Boot y sus implicaciones para la seguridad del dispositivo.
Explore a novel eavesdropping technique using light bulb vibrations to reconstruct speech in real-time, overcoming limitations of previous side-channel attacks for audio surveillance.
Explore tactics of modern information operations, their impact on public opinion, and how to defend against them in the context of upcoming elections.
Explore challenges in maintaining election integrity amid a pandemic, focusing on secure voting technology and protecting voter health. Learn about scaling up safer, accessible voting mechanisms.
Insights into Black Hat Briefings review process, Malware Track leadership, and community development initiatives from cybersecurity expert Matt Suiche, founder of Comae Technologies.
Explore zero-trust security's benefits in addressing current and future challenges beyond attacks, with insights from industry experts on implementation and design patterns.
Explore Android's permission vulnerabilities, invisible foreground services, and spyware risks. Learn detection methods and protective measures for enhanced mobile security.
Explore a novel graph-based approach to cloud infrastructure attacks, revealing vulnerabilities in resource relationships and demonstrating potential privilege escalation techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.