Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Management & Leadership
Software Vulnerabilities
Medicine and the Arts: Humanising Healthcare
Umano Digitale
Academic Writing Made Easy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore firmware vulnerabilities in Mac systems, demonstrating software-only attacks and showcasing the potential of Mac firmware malware. Learn about shared vulnerabilities and case studies.
Explore TOTEM and DRAKVUF systems for large-scale malware analysis, addressing challenges in file diversity, volume, and dynamic analysis through cloud-based orchestration and hardware virtualization.
Explore event correlation in cybersecurity using Giles, a compiler creating SQL-based engines. Learn to detect patterns, link records, and enhance security analysis across various scenarios.
Explore Windows 10's revolutionary OS architecture, featuring Virtual Secure Machines, Secure Kernel Mode, and Isolated User Mode. Learn how these changes enhance security and impact system design.
Explore Node.js security issues and effective measures for secure application development. Learn about weak cryptography, testing, MongoDB, and see a practical demo.
Explore attacks on gas pump monitoring systems, their vulnerabilities, and the motives behind them. Learn about honeypot deployment and prevention strategies.
Explore deep learning for network traffic identification, covering neural networks, automatic feature learning, and anomaly detection. Improve protocol identification beyond traditional methods.
Explore how Passive DNS can help investigators minimize collateral damage during cyber criminal takedowns, ensuring precise targeting and avoiding harm to innocent parties.
Explore techniques to recognize and exploit template injection vulnerabilities, leading to remote code execution in web applications. Learn automated detection methods and application-specific exploits.
Explore Funtenna, a software technique for covert data exfiltration through electromagnetic emanations in various computing devices, including its mechanisms, implementations, and implications for network security.
Explore the DRAM Rowhammer bug's security implications, from bit flips to kernel privilege escalation. Learn about exploit techniques, mitigations, and the physics behind this hardware vulnerability.
Explore the process of reverse engineering and repurposing OnionDuke, a suspected Russian government malware, for use in other tools. Learn about malware analysis and ethical considerations in cybersecurity research.
Explore iOS 8's new code packaging rules and their impact on security. Learn about TrustKit, an open-source library for easy SSL public key pinning implementation in iOS apps without source code modification.
Explore modern honeypot techniques for enhanced network security. Learn about application traps, booby-trapped documents, and cloud-based deception to detect and prevent breaches effectively.
Explore nation-state malware research, focusing on attribution challenges and novel techniques for linking binaries. Gain insights into the complexities of threat intelligence and state-sponsored cyber espionage.
Get personalized course recommendations, track subjects and courses with reminders, and more.