Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
Dino 101: Dinosaur Paleobiology
Supporting Victims of Domestic Violence
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced techniques for exploiting SSL vulnerabilities, including new methods to bypass encryption, optimize attacks, and implement persistent command-and-control strategies. Novel mitigation approaches are also discussed.
Exploring critical vulnerabilities in Perl's core modules and CGI frameworks, demonstrating fundamental language issues through 0-days, and challenging the "developer's fault" narrative.
Uncover vulnerabilities in Linux and PaX ASLR implementations, exploring low entropy, distribution issues, and object correlations. Learn to bypass Full ASLR and discover ASLR-NG, a new design addressing current weaknesses.
Explore mobile browser vulnerabilities and security policy bypasses, including Same Origin Policy and Content Security Policy. Learn testing methodologies and see real-world examples of Android browser exploits.
Explore economic strategies to reduce cyberattack incentives by lowering attacker value rather than raising costs. Examine defense approaches for both financial and state-sponsored threats to secure future devices.
Explore tools for analyzing crashes on Linux and ARM, using dynamic binary instrumentation and backward taint analysis to determine exploitability. Learn about ARM-Tracer and ARM-Analyzer for efficient crash analysis.
Exploit bypasses Windows authentication and BitLocker encryption, allowing unauthorized access to sensitive data on encrypted disks without cryptographic brute-forcing or hardware manipulation.
Explores root detection methods in Android security and BYOD apps, revealing vulnerabilities. Presents AndroPoser tool to bypass root checks, highlighting the need for improved mobile security measures.
Explore Docker container vulnerabilities, exploitation techniques, and security risks. Learn about cgroups, namespaces, and mitigation strategies for protecting critical data in containerized environments.
Innovative approach to monitoring DNS changes, enabling better detection of security threats, phishing, and malicious behavior. Practical examples and demo included.
Explore mobile device data security challenges, debunk full-disk encryption myths, and learn sophisticated secure storage techniques for iOS and Android to protect against physical access attacks.
Explore vulnerabilities in Microsoft Lync/Skype for Business, including VoIP attacks, security design flaws, and client-side threats. Learn about attack vectors and practical threats with live demonstrations.
Explore a fuzzing approach to uncover vulnerabilities in Android's core system components. Learn about data generation, test execution, logging, and triage mechanisms for effective vulnerability detection.
Explore techniques for exploiting Adobe Flash Player vulnerabilities, bypassing Control Flow Guard, and executing data-only attacks without shellcode or ROP on Windows systems.
Explore advanced techniques for creating and detecting malicious application compatibility shims, including in-memory patching, obfuscation, and system subversion. Learn defensive strategies and tools for protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.