Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Health Care
Digital Marketing
Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course)
Umano Digitale
Web Security Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Implementing IT security post-cyber attack: strategies, challenges, and lessons learned from Saudi Aramco's 2012 incident and subsequent security unit establishment at Aramco Overseas Company.
Explore China's Great Cannon: its inception, functionality as a Man-in-the-Middle proxy, weaponization of users, political motivations, and future implications. Learn protective measures against this powerful censorship tool.
Explore advanced polymorphism techniques using Return Oriented Programming for antivirus evasion, with practical demonstrations of the ROPInjector tool and its effectiveness against detection methods.
Explore the evolving landscape of Internet scams, their increasing sophistication, and user vulnerability. Learn about targeted attacks, spam filter effectiveness, and factors influencing scam susceptibility.
Explore NFC payment vulnerabilities, cloning techniques, and security mechanisms. Learn to set up a testing lab and conduct fraudulent transactions using off-the-shelf devices.
Exploring government demands for backdoor access to encrypted data, examining proposed solutions, and discussing the balance between security and privacy in digital communications.
Unveils a new attack vector against SMBv2, affecting all IE versions. Demonstrates remote credentials theft and user impersonation from the internet, exploiting bugs for complete user compromise without interaction.
Explore the Computer Fraud and Abuse Act through a federal prosecutor's lens. Gain insights into charging decisions, sentencing factors, and balancing security research with law enforcement needs.
Explore Windows kernel token handling vulnerabilities, learn to identify and exploit them for privilege escalation, and understand patterns for conducting security reviews.
Comprehensive methodology for reverse engineering and securing cities' IT infrastructure, exploring vulnerabilities and developing strategies for penetration testing and defense at the urban scale.
Explore vulnerabilities in mobile fingerprint authentication, including authorization attacks, sensor spying, and backdoors. Learn to secure fingerprints and mitigate risks in this eye-opening analysis.
Explore universal Android rooting through kernel exploitation, focusing on a Use-After-Free bug affecting all Linux versions. Learn about innovative techniques for 64-bit devices and bypassing modern kernel mitigations.
Unveiling a critical x86 design flaw allowing privilege escalation, exploring forgotten backdoors, and demonstrating how to exploit vulnerabilities in processor architecture.
Uncover techniques to detect and protect against commercial mobile spyware, safeguarding personal privacy and corporate security in an era of increasing digital surveillance.
Explore vulnerabilities in hypervisors through firmware and hardware emulation, demonstrating attacks and their impacts. Learn about firmware rootkits and new testing modules for hypervisor security.
Get personalized course recommendations, track subjects and courses with reminders, and more.