Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how CCTV camera blind spots create security vulnerabilities through location-based confidence weakness, and learn about TipToe - a novel evasion attack demonstrating detection flaws across various conditions.
Explore the critical relationship between aviation safety and cybersecurity standards, from DO-178 to DO-356A, understanding system design principles, assurance levels, and threat modeling in modern aircraft systems.
Discover practical strategies to detect and defend against digital deception across network layers, from electromagnetic spoofing to false narratives, while developing critical skills to discern truth in our interconnected world.
Discover Recursive Request Exploits (RRE), a new attack methodology that bypasses authentication and payment controls by weaponizing interdependent web requests to exploit logic flaws.
Uncover critical vulnerabilities in Secure Web Gateways through "Last Mile Reassembly Attacks" and learn how to bypass enterprise-grade security solutions using an open-source attack toolkit.
Discover practical web timing attack techniques to uncover server secrets, masked vulnerabilities, and hidden attack surfaces using efficient, real-world methods and open-source tools.
Delve into Windows Hello's security vulnerabilities and authentication mechanisms, exploring attack vectors and hardware protection bypasses for biometric authentication without physical compromise.
Discover WHAD, a versatile framework for wireless protocol hacking that enables hardware interoperability and simplified tool development for security researchers exploring wireless vulnerabilities.
Uncover critical security vulnerabilities in Wi-Fi cameras and baby monitors, exploring attack surfaces, privacy issues, and zero-day exploits while learning practical remediation strategies for IoT devices.
Discover critical security vulnerabilities in CI/CD pipelines through a case study of Bazel GitHub Action, learning practical strategies to protect your projects from command injection attacks.
Explore the fascinating intersection of WiFi scanning and aviation as two researchers conduct aerial wireless network detection experiments using a Cessna, revealing surprising insights about signal ranges and detection capabilities.
Dive into advanced LDAP query obfuscation techniques and defense strategies, exploring a comprehensive framework for detecting and preventing directory services attacks through custom tokenization and parsing.
Dive into real-world attack vectors and strategies for industrial networks through a decade of Red Team exercises, focusing on operational technology and control system vulnerabilities.
Discover how to implement EPSS for vulnerability management, leveraging data-driven insights to predict and prioritize exploit risks in CI/CD pipelines and system patching processes.
Gain insights into real-world challenges and practical strategies for developing secure LLM applications, exploring vulnerabilities, defense mechanisms, and best practices for robust AI systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.