Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
Dino 101: Dinosaur Paleobiology
Supporting Victims of Domestic Violence
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Hands-on workshop for developing iOS malware using the su-A-Cyder framework. Learn techniques to create and execute malware samples on Apple devices, exploiting recent policy changes.
Discover a novel extension-reuse vulnerability in Firefox and learn about CROSSFIRE, a static analyzer that detects these vulnerabilities and generates exploit templates for rapid proof-of-concept creation.
Explore real-time threat detection using machine learning on massive DNS data. Learn about Avalanche stream processing and NLP-Rank for automated phishing detection at scale.
Practical approach to application security: lightweight team, agile methods, and operational excellence. Covers assessments, bug handling, and private bug bounty programs, with actionable advice for managers and practitioners.
Explore NumChecker, a VMM-based framework for detecting kernel rootkits using Hardware Performance Counters. Learn about its implementation, effectiveness, and security analysis.
Explore emerging challenges in passive DNS threat intelligence and learn multivariate solutions to overcome them, enhancing your ability to identify related malicious domains effectively.
Insightful discussion on strategies to attract, retain, and promote women and minorities in cybersecurity, addressing industry challenges and sharing personal experiences to foster inclusivity and diversity.
Explore iOS security mechanisms including HomeKit, Auto Unlock, iCloud Keychain, Data Protection, and JIT hardening. Learn about Apple's innovative approaches to protect user data and enhance mobile security.
Explores security vulnerabilities in websites with partial HTTPS deployment, revealing how cookie hijacking can expose sensitive user data and functionality across major online platforms.
Explore network security risks in short-term rentals, including attacks and defenses for both renters and property owners. Learn practical countermeasures to protect against potential threats in the sharing economy.
Explore the potential for worms in smart light networks, focusing on Philips Hue's security measures and advanced techniques for hacking IoT devices.
Unveils HEIST, a browser-based attack exploiting SSL/TLS vulnerabilities without network access. Demonstrates how to leak cross-origin response sizes, enabling compression-based attacks and sensitive information extraction from popular websites.
Innovative technique for concealing malware within digitally signed files, evading detection by security solutions. Explores PE file structure, certificate table manipulation, and memory-based execution without disk writing.
Guidance on handling law enforcement demands for technical assistance, covering types of requests, legal authority, and response options for companies protecting user data and privacy.
Exploring the Internet's success, its underlying principles, and the potential threats to its architecture. Emphasizes the importance of cryptography, open networks, and hacking in shaping a functional global network.
Get personalized course recommendations, track subjects and courses with reminders, and more.