Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore psychological tactics to address workplace security vulnerabilities, focusing on staff's reluctance to challenge suspicious individuals and behaviors despite obvious red flags.
Explore vulnerabilities in Graph Neural Networks, including data extraction and model inversion attacks, with insights on protecting proprietary data and models in real-world applications.
Explore Windows container isolation, its implementation, and potential vulnerabilities. Learn about server silos, job objects, and the security implications of container breakouts.
Explore advanced fault injection techniques to bypass glitching protections on ARM TrustZone-M, revealing vulnerabilities in real-world computing devices and discussing potential countermeasures.
Explore CastGuard, a novel mitigation technique for preventing illegal static down-casts in C++ code, enhancing security in Windows components through efficient virtual function table pointer utilization.
Exposing critical security flaws in Samsung Galaxy devices' hardware-backed keystore through reverse engineering, revealing vulnerabilities in cryptographic design and implementation.
Discover how XML parsing quirks in XMPP can be exploited for attacks, including a demonstration of remote code execution in Zoom, presented by security researcher Ivan Fratric.
Explore advanced HTTP request smuggling techniques using browsers as attack platforms. Learn to exploit server vulnerabilities, poison connection pools, and launch sophisticated web attacks.
Explore OASIS, a framework for dynamic kernel analysis, enabling flexible control and data collection from kernel threads for various applications like memory introspection and malware testing.
Explore CI/CD pipeline vulnerabilities, their critical role in infrastructure, and novel exploitation techniques. Learn about real-world examples and demos of turning build pipelines into remote code execution vectors.
Explore the Open Threat Hunting Framework to build, operationalize, and scale threat hunting in organizations. Learn from industry experts about effective strategies and best practices.
Explore vulnerabilities in UWB Real Time Locating Systems, potential exploits, and mitigation strategies to secure these systems against cyber attacks.
Explore methodology for assessing ELAM drivers, demonstrating how overly-permissive rules enable adversary tradecraft opportunities through abuse of intended functionality, with practical demonstrations and insights.
Explore recent UEFI firmware security changes, focusing on Intel CPUs. Covers firmware mitigations in SMM/DXE and new attacks on Intel PPAM, offering unique insights from an offensive security perspective.
Explore hybrid machine learning for malware classification using static and dynamic analysis, Windows kernel emulation, and neural networks. Learn about adversarial ML and future developments.
Get personalized course recommendations, track subjects and courses with reminders, and more.