Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
Dino 101: Dinosaur Paleobiology
Supporting Victims of Domestic Violence
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Insider's expose of FTC's cybersecurity regulation tactics, revealing government overreach and bullying practices. Highlights whistleblower case, Congressional investigation, and implications for businesses facing federal scrutiny.
Explore the risks of third-party libraries in software, analyzing vulnerability metrics and exposure times. Learn strategies to mitigate risks and improve security practices in your organization.
Explore advanced CPU performance counters for enhanced platform security, including RowHammer defense and ROP mitigation. Learn practical techniques with real-world exploit demonstrations and performance impact analysis.
Versatile CPU emulator framework supporting multiple architectures and platforms. Offers clean API, thread-safety, and language bindings for building advanced security tools and research.
Explore cryptographic entropy usage, sources, and management across systems. Learn to analyze and improve random number generation for enhanced security in modern IT infrastructures.
Uncover obfuscated API functions in modern packers using memory access analysis and iterative run-until-API methods. Learn techniques to deobfuscate Themida 32/64 packed binaries for effective malware analysis.
Explore techniques for detecting vulnerabilities and backdoors in embedded device firmware using static binary analysis, focusing on challenges and automated solutions for complex binary blobs.
Explore EdgeHTML's attack surface, compare it with MSHTML, and analyze exploit mitigations in Windows 10's new rendering engine for enhanced web security understanding.
Explore techniques to detect, bypass, and exploit honeypot technologies, turning defensive tools against defenders. Includes global honeypot mapping and vulnerability analysis.
Explore vulnerabilities in software-defined networks, focusing on ONIE and network operating systems. Learn about potential exploits, malware persistence, and strategies for securing control plane networks.
Exploring vulnerabilities in CDNs, this talk reveals attack patterns against high-availability websites, demonstrating potential risks and exploit development with far-reaching consequences.
Techniques for exploiting XXE vulnerabilities in file parsing, focusing on XML-supported formats like docx and xlsx. Includes real-world examples and introduces a tool for creating 'XXE backdoored' files.
Explores vulnerabilities in Square Reader devices, revealing potential for fraudulent transactions and credit card skimming through software flaws and hardware modifications in mobile point-of-sale systems.
Explore distributed reverse engineering techniques using intermediate representation in a clustered environment to analyze malware, extract characteristics, and improve threat intelligence initiatives.
Aprenda a implementar um programa de segurança tático e eficaz, focando em avaliações ágeis, resposta a incidentes e gerenciamento de bugs. Descubra por que abordagens táticas podem ser mais efetivas que estratégias de longo prazo.
Get personalized course recommendations, track subjects and courses with reminders, and more.