Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into a comprehensive simulation of cyberattacks on hydroelectric facilities, exploring both offensive tactics and defensive strategies through a custom-built ICS firing range environment.
Discover how to leverage LLMs for automated BOLA vulnerability detection in APIs and web applications, exploring BOLABuster's innovative approach to identifying critical security risks at scale.
Master Kubernetes security monitoring and attack simulation techniques for effective threat detection and defense in containerized environments.
Explore critical vehicle security vulnerabilities through UDSonCAN fuzzing techniques, revealing potential safety risks in diagnostic systems and their essential countermeasures for modern electric vehicles.
Uncover critical vulnerabilities in railway signaling systems through an analysis of accessible hardware tools and their potential impact on train operations, with focus on Spanish infrastructure.
Explore cybersecurity challenges and policy considerations in the rapidly expanding EV charging infrastructure, focusing on vulnerability assessment and risk mitigation strategies.
Discover powerful web cache exploitation techniques, including Static Path Deception and Cache Key Confusion, to identify and exploit URL parsing vulnerabilities across major platforms like Azure Cloud and Cloudflare.
Delve into VMware device virtualization security, exploring USB system vulnerabilities, SCSI device emulation, and VMKernel design flaws through real-world bug hunting experiences and discoveries.
Explore the fascinating Antwerp Diamond Heist to understand defense-in-depth security principles through analysis of history's greatest vault breach and its modern cybersecurity implications.
Uncover the alarming journey of lost corporate devices in public markets through data scraping, OCR clusters, reverse engineering, and conversations with underground collectors.
Dive into advanced Android security research exploring Qualcomm Adreno GPU vulnerabilities, exploitation techniques, and kernel-level attacks to achieve root access, with practical mitigation strategies.
Explore critical vulnerabilities in medical devices and hospital networks, examining security challenges, SBOM misconceptions, and strategies for creating more secure healthcare environments.
Uncover shocking vulnerabilities in Norwegian banking systems through real-world examples of identity theft and unauthorized access, revealing critical lessons about paper-based security flaws.
Discover how to identify and exploit Bluetooth vulnerabilities in modern vehicle systems using BlueToolkit, exploring real-world security implications and practical attack vectors in automotive and aviation contexts.
Explore the practical challenges of implementing differential privacy systems, from explaining technical guarantees to non-experts to preventing misuse and integrating with existing security tools.
Get personalized course recommendations, track subjects and courses with reminders, and more.