Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores DNS as critical infrastructure, examining its evolution, security measures, and operational challenges. Analyzes ccTLD operations, hosting risks, and adoption of security features like DNSSEC and CAA records.
Novel attacks exploiting Wi-Fi sleep mode to leak encrypted frames and disrupt networks. Demonstrates vulnerabilities in WPA2/3, impacts on geofencing, and client isolation bypasses. Discusses potential mitigations and security trade-offs.
Explore the future of cybersecurity as automated malware campaigns face off against AI-powered defenses. Learn how the battle between good and bad AI will shape the landscape of digital security.
Explore firmware vulnerabilities in critical infrastructure using open-source tools. Learn techniques for deep security analysis, uncovering risks, and leveraging AI to simplify research and reverse engineering.
Innovative Micro Attack Simulations approach for validating specific security controls, enhancing cyber resilience through targeted assessments of technical and non-technical aspects, demonstrated with a ransomware attack case study.
Analyze the Vulkan Leaks' impact on cybersecurity, exploring historical context and critical implications for threat intelligence and network defense strategies.
Explore the most significant cybersecurity events, active threat actors, and surprising facts from 2022-2023 in this comprehensive overview of the rapidly evolving digital security landscape.
Explore CommandGPT's potential in offensive security, leveraging AI for dynamic code generation in command and control frameworks and simulating ransomware techniques.
Explore real-world physical penetration testing experiences across diverse facilities, from banks to cheese factories. Gain insights into security vulnerabilities and unconventional tactics used in red team operations.
Explore OSDP access control protocol, its functionality, and security implications. Learn to interface with devices and audit implementations for potential vulnerabilities.
Explore the security vulnerabilities and potential risks associated with eSIM technology in mobile phones and desktop devices, raising awareness about offensive operations and post-compromise scenarios.
Dive into the reverse engineering process of a popular EV charger, exploring firmware analysis, custom bootloader creation, and potential security improvements in this insightful presentation.
Explore the 15-year evolution of mobile malware, from Symbian OS to Android, examining shifting trends and current threats in this comprehensive keynote on mobile security.
Explore the hidden dangers of AI autonomy through Model Context Protocol, revealing how LLMs can chain tools independently and create new security vulnerabilities in modern systems.
Discover how to manipulate EDR telemetry through ETW injection, create fake devices in MDE, and exploit event capping to blind security tools in this advanced cybersecurity research.
Get personalized course recommendations, track subjects and courses with reminders, and more.