Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores legal and ethical implications of security researchers handling sensitive user data during bug bounty disclosures, examining responsibilities and potential consequences for all parties involved.
Explore how government-linked cyber actors influence elections through disinformation campaigns, focusing on a case study from Colombia's 2022 elections and strategies for detecting such operations.
Explore techniques for detecting and capturing in-the-wild Windows Local Privilege Escalation vulnerabilities, including methodology development and continuous improvement strategies.
Explore automated security vulnerability detection and fixing in open-source software, including techniques like OpenRewrite and control flow analysis for efficient, large-scale remediation.
Explore vulnerabilities in Hyper-V's GPU-Paravirtualization feature, examining 4 fixed DirectX component issues and their implications for virtualization security.
Uncover vulnerabilities in Siemens ET 200SP SoftPLC, exploring its architecture, boot process, and potential attack vectors. Learn about PC-based PLCs and their security implications in industrial control systems.
Methodology for detecting wireless signal tracking using low-cost hardware and Python. Covers SIGINT techniques, MAC address randomization, and provides code for DIY implementation.
Explore a protocol for collectivizing security bounties, enabling companies to showcase software security and ethical hackers to retrieve bounties without ambiguity, eliminating subjectivity in triage processes.
Techniques for detecting unauthorized use of algorithms in commercial products, including search methods, reverse-engineering, and a real-world case study. Provides strategies for addressing IP theft and prevention.
Explore Intel Wi-Fi chip vulnerabilities through reverse-engineering, uncovering firmware exploits and code execution risks in complex features like Wake-on-WLAN and TDLS.
Unveils a novel exploitation technique surpassing Dirty Pipe, enabling arbitrary file overwriting and privilege escalation through double-free vulnerabilities, applicable across affected kernel versions.
Explore vulnerabilities in Source Code Management systems, including reconnaissance, user role manipulation, and repository takeover. Learn attack scenarios and defensive strategies for GitHub, GitLab, and Bitbucket.
Explore vulnerabilities in Cisco ASA firewalls, including ASDM package verification issues and FirePOWER module exploits. Learn to create malicious packages and gain root access.
Explore syscall-flow-integrity protection (SFIP) to enhance application security by limiting control flow across user-to-kernel transfers, addressing vulnerabilities in complex software systems.
Explore Firefox's innovative approach to mitigating zero-day attacks using in-memory sandboxes for third-party C libraries, enhancing security against memory safety vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.