Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in modern CNC machines, including network security risks, code leaks, and potential for sabotage. Learn about countermeasures to protect critical industrial assets.
Explore a blind VCC glitching technique to bypass secure boot mechanisms on mobile SoCs, demonstrated on Qualcomm MSM8916/APQ8016. Learn practical application and see a live demo of this effective method.
Explore ethical challenges and solutions in handling social engineering pentest aftermath, focusing on responsibility, consequences, and improving security culture.
Demystifies AI and machine learning for SOC teams, focusing on practical applications like data leak prevention. Includes live demo and insights from Credit Agricole's SOC experience.
Automated discovery of RPC functions in Microsoft protocols to find authentication coercion vulnerabilities, with focus on parsing documentation and generating proof-of-concept code.
Exploring the challenges and potential solutions for creating a defendable Internet, examining incentives, economics, and the balance between security and openness in the digital landscape.
Explore strategies for enhancing cyber resilience during geopolitical crises, focusing on threat intelligence and active defense to protect critical information infrastructures.
Explore stack-based buffer overflow exploitation techniques, bypassing modern mitigations by leveraging exception handling mechanisms to resurrect old exploits and achieve successful attacks.
Exploring cybersecurity's evolution, challenges, and future direction. Discusses lessons from the past, current trends, and strategies for shaping the industry's destiny in an increasingly connected world.
Exposing hidden risks in multi-cloud IAM, detailing access flaws, misconfigurations, and inconsistencies that can lead to unintended access and privilege escalation across cloud providers.
Explore unauthenticated remote code execution in popular IAM solutions, covering past attacks, audit approaches, and vulnerability chaining for infiltrating identity providers.
Explore AI-synthesized speech detection techniques and their real-world effectiveness in combating voice cloning and fake audio. Uncover challenges and limitations in current approaches.
Explore Apple's Endpoint Security Framework for macOS threat detection. Learn to utilize ESF data for basic and advanced behavioral-based detections, comparing old and new detection methods.
Explore Microsoft IIS's Dynamic Hashing algorithm and its vulnerabilities. Learn about potential collision attacks on hash tables in web server architecture and their implications for cybersecurity.
Explore WebAssembly security vulnerabilities through a new fuzzing framework, focusing on VM escape and RCE risks in Wasm runtimes for edge computing and web applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.