Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive overview of container escape techniques, from basic concepts to advanced exploits, covering orchestrators, Docker sockets, mount points, and kernel structures.
Explore dynamic analysis techniques for C++ reverse engineering, focusing on structure usage and function argument types through DLL injection-based automation.
Explore deepfake technology's offensive and defensive applications, including creation process and underlying deep learning models. Gain insights into this powerful and controversial AI tool.
Explore unique identification and cross-device tracking of Apple devices, including public APIs and vulnerabilities, to understand potential privacy implications and security risks.
Explore techniques for injecting malicious payloads into microcontrollers, from basic to advanced methods, to create hardware backdoors. Learn about firmware entry points and payload execution.
Explore vulnerabilities in connected BMW cars' infotainment and telematics systems, including 0-day exploits, and learn about mitigation strategies for enhanced automotive cybersecurity.
Uncover vulnerabilities in Windows Hello for Business and learn to scan and secure corporate environments with a new toolset for enhanced Active Directory visibility.
Explore the eSurv case study and trace the evolution of lawful intercept from Windows Trojans to professional spyware, uncovering a government malware scandal and its implications.
Explore tools and methods for hacking BTLE-based mobile phone key systems in hotels, from proof of concept to real-world application. Learn about vulnerabilities in IoT security and their practical implications.
Explore the inner workings of Apple's T2 chip, including methodology and tools for complex security research, going beyond publicly available technical details.
Explore how female InfoSec communities in Korea, Japan, and Taiwan are built, maintained, and overcome challenges to foster sustainable growth and attract new members.
Explore how online propaganda exploits socio-technical systems through data science, psychology, and security principles to influence millions of users.
Explore techniques for securely storing and querying outsourced data, focusing on range queries. Learn about common building blocks, commercial solutions, and potential vulnerabilities in encrypted databases.
Explore techniques for analyzing pre-installed Android apps, including emulator challenges, component collusion detection, and privileged context behavior changes.
Explore Windows 10 memory compression implementation, undocumented structures, and algorithms to enhance forensic tools for detecting malicious activities in compressed memory.
Get personalized course recommendations, track subjects and courses with reminders, and more.