Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Management & Leadership
Software Vulnerabilities
Medicine and the Arts: Humanising Healthcare
Umano Digitale
Academic Writing Made Easy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore automated human vulnerability scanning with AVA, a tool for mapping people's connectivity, testing security threats, and measuring behavior to address human security risks.
Explore attacker strategies to defeat machine learning-based security defenses, analyze industry issues enabling these vulnerabilities, and discover novel data sourcing solutions for improved protection.
Explore NSA-inspired gadgets for USB, PCI Express, I2C, GSM, Bluetooth, and RF retroreflectors. Learn about tools mimicking intelligence agency capabilities for electronic device eavesdropping and surveillance.
Explore Windows 10's innovative approach to defeating Pass-the-Hash attacks through strong isolation of symmetric credentials, leveraging virtualization technology to sequester secrets from potential attackers.
Reveals vulnerabilities in 3G/4G SIM cards, demonstrating how to clone them using differential power analysis. Discusses implications for mobile network security and showcases practical experiments.
Explore WMI's potential for stealthy, persistent attacks on Windows systems. Learn offensive techniques, backdoor creation, and defense strategies against WMI-based threats.
Comprehensive exploration of remote vehicle hacking, demonstrating real-world attacks on unaltered cars and pivoting through hardware to send CAN bus messages affecting critical systems.
Explore advanced Active Directory attack methods, detection techniques for Golden and Silver Tickets, and effective mitigation strategies. Learn to identify and protect against sophisticated network intrusions.
Explore advanced OS X malware techniques, persistence methods, and security bypasses. Learn to create sophisticated threats and enhance Mac protection against current and future malware.
Explore techniques for extracting intelligence from malware repositories using program analysis and data mining, with insights on connecting seemingly disparate cyber attacks and tracking malware trends.
Explore techniques for exploiting chemical plant systems to cause economic damage while avoiding detection. Learn about attack stages, cost considerations, and creating misleading forensic evidence.
Debate on NSA surveillance practices, focusing on Section 215 of the Patriot Act and recent reforms. Explores impact on privacy, national security, and the effectiveness of congressional oversight.
Experts discuss implications of Wassenaar Arrangement's export control on "intrusion software" for cybersecurity industry, research, and privacy, drawing parallels to 1990s crypto wars.
Explore cyber-physical attacks on industrial systems, including generic "bread and butter" techniques and mitigation strategies beyond network security.
Explores automated analysis of images in malware, focusing on identifying visually similar samples and classifying images into categories to enhance malware triage and reveal attacker patterns.
Get personalized course recommendations, track subjects and courses with reminders, and more.