Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
Dino 101: Dinosaur Paleobiology
Supporting Victims of Domestic Violence
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques to bypass Google's reCAPTCHA using risk analysis manipulation, deep learning for image recognition, and automated solving methods. Discusses implications for CAPTCHA security.
Explore Android's Binder IPC vulnerabilities through fuzzing and exploitation techniques. Learn to identify, analyze, and exploit "BadParcel" issues for privilege escalation in high-privilege processes.
Explore security vulnerabilities in analog-to-digital conversion for industrial control systems. Learn how attackers can manipulate sensor data to cause physical consequences while evading detection.
Explore wireless IoT security challenges, signal identification techniques, and best practices for revealing unknown signals. Includes a demo of a new tool for mapping radio spectrum and identifying devices.
Explore active detection techniques for Dynamic Binary Instrumentation, focusing on exploiting weaknesses and escaping control. Learn to identify and overcome DBI environments in cybersecurity.
Explore wireless security research techniques combining SDR and non-SDR tools. Learn efficient reverse engineering processes for analyzing and decoding radio signals in this hands-on demonstration.
Explore iOS security vulnerabilities through enterprise apps, examining real-world statistics and a zero-day attack that bypasses Apple's gatekeeper, revealing critical flaws in the iOS security model.
Explores CVE-2015-0057 vulnerability, User Mode Callback mechanism, and new exploit techniques in Windows kernel. Analyzes exploit methodology, vulnerability detection, and implications for system security.
Explore a PowerShell toolkit leveraging Windows Desired State Configuration for command-and-control, malware persistence, and automatic re-infection. Learn attack techniques and defensive strategies.
Explore CANtact, an open-source tool for automotive network analysis. Learn to view, decode, and manipulate CAN bus traffic for reverse engineering and security testing of vehicle systems.
Explore vulnerabilities in professional drones and learn how to exploit them to take control. Discover practical fixes and remediation approaches for these security compromises.
Demonstration of a self-contained PLC worm targeting Siemens S7-1200 PLCs, showcasing network scanning, self-propagation, and remote control capabilities while evading detection.
Explores Android vulnerabilities exploited by spyware and proposes a detection method using fuzz testing to mitigate risks and protect user privacy on smartphones.
Automated framework for discovering vulnerabilities in embedded web interfaces through dynamic firmware analysis. Validates effectiveness on 1925 firmware images from 54 vendors, uncovering critical security flaws.
Explore flaws in Data Loss Prevention solutions, including administrative interfaces and inspection engines, to understand their capabilities and shortcomings in protecting sensitive information.
Get personalized course recommendations, track subjects and courses with reminders, and more.