Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Management & Leadership
Software Vulnerabilities
Medicine and the Arts: Humanising Healthcare
Umano Digitale
Academic Writing Made Easy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring Android's Stagefright framework vulnerabilities, focusing on discovery techniques, OS internals, and security implications. Demonstrates proof-of-concept code and discusses mitigation strategies.
Exploring the evolution of the internet, from idealistic beginnings to current challenges, and examining future trends in digital security, privacy, and freedom.
Explore AWS security challenges, vulnerabilities, and solutions. Learn assessment techniques and tools to protect your cloud infrastructure and applications.
Explore security vulnerabilities in smart power meters, including remote control capabilities and potential risks. Learn about device reverse engineering and its implications for connected home technology.
Comprehensive analysis of Mac OS X 10.10 Yosemite's security features, demonstrating vulnerabilities, offensive techniques, and introducing a new security tool for detecting rootkits and abnormalities.
Explore advanced C++11 metaprogramming techniques for software obfuscation, including compile-time code generation, polymorphism, and practical applications like string encryption and call obfuscation.
Explore vulnerabilities in Two-Factor Authentication systems, including a new attack on mobile TOTP. Learn best practices for secure 2FA deployment in enterprise and web applications.
Explore advanced PDF exploitation techniques, from obfuscated JavaScript analysis to shellcode extraction. Learn to modify and obfuscate malicious PDFs for pentesting and understand cybercriminals' latest tricks.
Explore IPv6 security vulnerabilities and evasion techniques against high-end IDPS devices, with demonstrations and proposed mitigation strategies for network protection.
Explore security aspects of Scala's Play and LiftWeb frameworks, including OWASP Top 10 vulnerabilities, exploitation mitigations, and a new Scala library for SSRF prevention.
Explore vulnerabilities in Android's Linux PRNG, focusing on early boot attacks and real-world exploitation vectors. Learn about potential security risks and mitigations for embedded platforms.
Explore a new web attack vector that allows attackers to download malicious files from trusted domains without uploading them, potentially bypassing security measures and spreading across social networks.
Explore kernel exploitation technique ret2dir, bypassing isolation protections by leveraging direct-mapped memory. Learn about vulnerabilities, attack models, and mitigation strategies for Linux kernels.
Explore how smartphone gyroscopes can be exploited to eavesdrop on nearby speech, bypassing microphone permissions and posing privacy risks. Learn about potential attacks and defenses.
Explore sophisticated attacks on anti-cheat systems in multiplayer gaming, including practical demonstrations and implications for game security and the future of cheat prevention.
Get personalized course recommendations, track subjects and courses with reminders, and more.