Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
Dino 101: Dinosaur Paleobiology
Supporting Victims of Domestic Violence
Unlocking Information Security I: From Cryptography to Buffer Overflows
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the challenges and strategies for preserving online freedom of speech, examining the impact of censorship and the role of tech companies in protecting lawful content.
Explore reverse engineering and exploitation of GlobalStar's simplex satcom protocol, uncovering vulnerabilities in satellite communications and demonstrating interception and spoofing capabilities.
Explore critical XXE vulnerabilities in enterprise software, including 0-day exploits in Java and Internet Explorer. Learn detection, exploitation, and prevention techniques.
Explore critical vulnerabilities discovered through bug bounty programs, their impact on customers, and strategies for improving submission quality and researcher participation.
Explore vulnerabilities in multi-precision integer arithmetic used in cryptography implementations. Learn bug patterns, exploitation techniques, and strategies for automated vulnerability detection.
Analyze CFG's weaknesses and explore a new technique to bypass it, enabling previously prevented exploit methods and opening avenues for developing more advanced exploit techniques.
Explore advanced techniques for detecting and preventing memory corruption vulnerabilities, including execute-only memory and code pointer hiding, to enhance software security against sophisticated exploitation methods.
Explore Android vulnerabilities affecting millions of devices, including Lollipop. Learn about exploits, technical root causes, and remediation strategies for these critical security flaws.
Explore vulnerabilities in ECMAScript engines through function redefinition, examining implementation differences and strategies for identifying security issues in various targets.
Explore Internet Explorer's silent exploit mitigations, their weaknesses, and potential attack vectors. Learn techniques to bypass these security measures and gain insights into hardening browser defenses.
Explore security data science challenges and solutions, including machine learning for attack detection, threat intelligence, and malware analysis, with focus on overcoming unique security-specific obstacles.
Explore a novel side channel attack exploiting CPU out-of-order execution for covert cross-VM communication in cloud environments, with live demos and mitigation techniques.
Explore deep learning techniques applied to disassembly for malware identification, covering the process from raw binaries to model training and evaluation against active malware feeds.
Explore vulnerabilities in DAB radio systems in cars, potential security risks, and implications for automotive cybersecurity using Software Defined Radio and custom testing tools.
Explore ZigBee's security vulnerabilities in IoT devices, focusing on smart home applications. Learn about weaknesses, practical exploits, and a new security-testing framework for this widespread communication standard.
Get personalized course recommendations, track subjects and courses with reminders, and more.