Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Management & Leadership
Software Vulnerabilities
Medicine and the Arts: Humanising Healthcare
Umano Digitale
Academic Writing Made Easy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Optimized fuzzing approach for iOS IOKit interfaces, dynamically resolving symbols and parameters to improve efficiency and effectiveness in vulnerability discovery.
Explore vulnerabilities in 3G/4G networks using femtocells. Learn to intercept data and exploit weaknesses in UMTS infrastructure, from unboxing to proof-of-concept demonstrations.
Explore BGP security, its vulnerabilities, and practical countermeasures to build trust in the Internet's foundation. Learn about routing leaks, hijacking risks, and implementation strategies for a more secure network infrastructure.
Explore XSLT vulnerabilities and practical attacks on XML systems, including arithmetic manipulation, code logic failure, and compromising user confidentiality in web browsers.
Explore the security vulnerabilities of a Linux-powered precision rifle, including reverse engineering, attack surfaces, and implications of network-connected firearms.
Explore the creation of a secure, open-source computer the size of a flash drive. Learn about innovative hardware design and advanced security features for portable computing.
Explore vulnerabilities in RFID access control systems and learn how to exploit them using open-source hardware. Discover techniques for circumventing security, logging access, and cloning cards.
Explore practical web timing attacks, improving data collection and statistical analysis for more effective penetration testing. Learn adaptive techniques and open-source tools for identifying cryptographic vulnerabilities.
Explore distributed password cracking with CrackLord, a scalable system for load balancing GPU and CPU resources across multiple hardware systems, enhancing efficiency and accessibility.
Exploiting vulnerabilities in satellite receivers to build botnets, highlighting risks in DVB-CA encryption, custom plugins, and CCCAM protocol. Demonstrates potential for large-scale network compromise and unauthorized access.
Explore mobile device data security challenges, debunk full-disk encryption myths, and learn sophisticated secure storage techniques for iOS and Android, addressing real-world application vulnerabilities.
Exploración de vulnerabilidades en Windows Update y WSUS, demostrando cómo comprometer sistemas empresariales mediante actualizaciones maliciosas y controladores de dispositivos USB.
Análisis basado en datos de indicadores de inteligencia de amenazas y comunidades de intercambio, explorando eficiencia, calidad y superposición de fuentes durante más de un año.
Explore how technologists can influence policy-making, focusing on the FTC's role in protecting online privacy and data security through enforcement, research, and consumer protection initiatives.
Explore cutting-edge biometric technologies, their advantages, and potential risks. Learn to evaluate security, reliability, privacy, and ethical concerns for informed implementation of future identification systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.