Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover vulnerabilities in touchscreen devices through electromagnetic interference attacks, exploring practical methods to compromise security and user interaction on smartphones and tablets.
Explore Kubernetes security vulnerabilities, privilege escalation techniques, and container escape risks. Learn to identify powerful system pods and implement mitigations to protect your cluster from potential attacks.
Explore SAP's HTTP server vulnerabilities and learn advanced exploitation techniques for memory corruption in the Internet Communication Manager, with real-world examples and demonstrations.
Detailed analysis of Industroyer2 malware targeting Ukraine's power grid, comparing it to the original Industroyer and exploring its communication with ICS hardware using industrial protocols.
Explore GitHub Copilot's vulnerabilities in code generation, including SQL injections and buffer overflows. Learn about the risks of AI-generated code and strategies for responsible use in software development.
Explore harm reduction principles in cybersecurity, challenging traditional approaches. Learn pragmatic strategies for effective risk management, reducing costs, and mitigating practitioner burnout.
Systematic analysis of CPU vulnerabilities, exploring root causes and connections between transient-execution attacks and architectural vulnerabilities. Identifies blank spots in CPU security research.
Demonstration of novel downgrade attacks against RPKI, exposing networks to prefix hijacks by disabling RPKI validation through malicious publication points.
Explore a new playbook for major cyber incident investigations, drawing lessons from aviation safety to create actionable insights and build a shared historical narrative in cybersecurity.
Unmasking APT recruitment tactics: Analysis of North Korean and Iranian threat actors using job-themed social engineering to compromise victims, including tradecraft and objectives.
Explore eBPF's evolution in Linux, its expanding capabilities, and its potential for detecting kernel exploits, with insights on probes, challenges, and performance implications.
Explore essential security knowledge for software engineers to build secure systems, addressing common issues and establishing a shared understanding of security principles.
Explore vulnerabilities in network-connected physical access control systems and their potential impact on organizational security, including breach detection and financial consequences.
Explore advanced Spectre attack techniques, focusing on Branch Target Injection and its ability to bypass hardware defenses, with insights on reverse engineering and practical demonstrations.
Explore advanced techniques to bypass endpoint security products using Windows Management Instrumentation, revealing vulnerabilities in SIEMs and EDRs for improved threat detection and mitigation.
Get personalized course recommendations, track subjects and courses with reminders, and more.