Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced CBC padding oracle attacks, including a resurrected POODLE vulnerability and the faster GOLDENDOODLE attack. Learn how TLSv1.3 addresses these security issues.
Explore using Rust for Trusted Applications, leveraging its security features like memory safety and error handling for system-level code development in secure environments.
Explore fault injection attacks on Secure Boot, their impact on embedded systems, and strategies for enhancing defenses through simulation techniques.
Explore Active Directory replication vulnerabilities, focusing on SAMBA implementation and mimikatz's DCSync feature. Learn techniques for extracting secrets and impersonating domain controllers.
Explore mainframe security vulnerabilities, reverse engineering techniques, and exploit development for z/OS systems, challenging common assumptions about mainframe invulnerability.
Explore the SirenJack vulnerability affecting emergency warning sirens, its potential impact, and the surprisingly simple methods used to exploit this critical infrastructure weakness.
Introducing DELTA: A powerful ONF-supported penetration testing tool for Software-Defined Networks. Learn about its capabilities and applications in enhancing SDN security.
Uncover Sednit's groundbreaking UEFI rootkit campaign, exploring its sophisticated techniques for deep system compromise and implications for cybersecurity in high-profile attacks.
Explore the resurgence of a critical TLS vulnerability affecting major vendors and websites, and learn why RSA PKCS #1 v1.5 encryption should be phased out.
Explore evolving cyber-diplomacy landscape, discussing UN consultations, private sector initiatives, and potential new norms in international cybersecurity following 2016 negotiations collapse.
Explore WireGuard, a modern VPN protocol offering improved security, performance, and simplicity compared to traditional options like IPsec and OpenVPN. Learn about its innovative design and benefits.
Explore macOS MDM vulnerabilities, including bootstrapping stages, IPC flows, and network security. Includes live demo of potential nation-state actor exploit on new Mac devices.
Insights into TRITON attack framework targeting industrial safety systems, exploring its unprecedented impact on cyber-warfare and critical infrastructure protection. Analyzes implications for future threats.
Strategies for addressing mental health challenges in the hacker community, focusing on burnout, depression, and suicide prevention. Emphasizes the importance of recognizing and treating psychological issues.
Insider look at designing and securing Black Hat Asia's network infrastructure. Explore behind-the-scenes challenges, experiences, and evolving designs from the Network Operations Center team.
Get personalized course recommendations, track subjects and courses with reminders, and more.