Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive overview of Windows process injection techniques for x64 systems, focusing on medium integrity processes without privilege elevation. Explores various methods and their implications.
Explore the transformation of DevOps into DevSecOps, covering open-source tools and cultural shifts needed for implementation, along with associated benefits and practical insights.
Explore DevOps basics, resilience, and chaos engineering. Discover factors behind elite organizations and how DevOps aligns with modern infosec goals in today's software-driven landscape.
Decrypting WhatsApp traffic and creating tools for vulnerability research, including a Burp Suite extension for investigating encrypted communications.
Uncover vulnerabilities in WPA3's Dragonfly handshake, including side-channel attacks and password partitioning techniques. Learn about design flaws and implementation issues affecting Wi-Fi security protocols.
Reveals findings from large-scale AWS Cognito security analysis, exposing vulnerabilities in identity pools granting access to thousands of S3 buckets, DynamoDB tables, and Lambda functions.
Explores vulnerabilities in 4G modules, demonstrating methods to probe and exploit weaknesses in car entertainment systems for remote control of vehicles.
Explore the blurred lines between cyber and physical warfare, examining government responses to cyber attacks and the evolving rules of engagement in modern conflicts.
Explore fascinating security issues and risks in memory-safe languages like Rust, based on insights from two years of cryptocurrency audits.
Learn how various cybersecurity teams can leverage MITRE ATT&CK framework to enhance threat tracking and protection strategies, with practical insights for immediate implementation.
Learn to detect malicious files using YARA rules and Zeek IDS for early-stage attack identification, enhancing network security with improved performance and targeted scanning techniques.
Explore Chrome browser security vulnerabilities and exploitation techniques from 2016 to 2019, presented by researchers who successfully pwned Nexus 6P in Mobile Pwn2Own 2016.
Explore vulnerabilities in Qualcomm's Venus hardware decoder, learn its architecture, and discover remote exploitation techniques for smartphone security research.
Explore the development of AI agents simulating attackers and defenders in cybersecurity, enhancing training for both defensive and offensive roles in network security.
Exploiting hidden communication channels in smartphone charging to steal private data, despite Android's "Charging only" mode safeguards. Demonstrates vulnerability in public charging stations and powerbanks.
Get personalized course recommendations, track subjects and courses with reminders, and more.