Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover how a single domain purchase can exploit WPAD vulnerabilities, leading to massive-scale man-in-the-middle attacks and compromising hundreds of thousands of internet clients through DNS manipulation.
Explore the complex interplay between state privacy laws aimed at protecting children online and their unintended consequences, from data collection concerns to First Amendment challenges.
Discover how to leverage AI computer vision tools in Azure and AWS to accelerate OSINT data analysis, perform object detection, facial recognition, and chronolocation analysis for forensic investigations.
Explore the vulnerabilities of modern access control systems through live demonstrations, understanding fundamental design flaws and historical attacks on card-based security mechanisms.
Explore security vulnerabilities in surveillance systems, focusing on NVR devices from major vendors like Hikvision and Dahua, while examining supply chain risks and exploitation scenarios.
Master essential Active Directory security strategies, from common attack vectors to implementing robust defensive measures for protecting enterprise environments and preventing network compromises.
Discover how to exploit Windows Update vulnerabilities to craft downgrade attacks, bypass security features, and compromise system integrity - from kernel to virtualization stack.
Delve into critical ATM security vulnerabilities, focusing on Diebold Nixdorf's VSS encryption weaknesses, exploitation methods, and essential defense strategies for financial systems protection.
Dive into OIDC security vulnerabilities, exploring authentication mechanisms, potential misconfigurations, and real-world attack vectors in cloud environments through CI/CD workflows and identity providers.
Dive into the security challenges of decentralized applications, exploring real-world vulnerabilities, threat modeling, and attack vectors in both Web2 and blockchain environments.
Delve into the behind-the-scenes journey of exploiting Xiaomi 13 Pro at Pwn2Own Toronto 2023, exploring regional security variations and the challenges of mobile device exploitation.
Explore critical vulnerabilities in electric vehicle charging systems and learn specialized security testing techniques for EVCC and ISO 15118 protocols in charging infrastructure.
Explore physical and side-channel vulnerabilities in electronic smart locks, focusing on PIN and RFID security risks in organizational locker systems and shared spaces.
Discover how to detect and mitigate persistent threats on Draytek devices through firmware analysis, reverse engineering, and custom security module development for enhanced network protection.
Dive into the critical Outlook security vulnerabilities, exploring RCE exploits through COM objects, NTLM leaks, and essential mitigation strategies for enterprise protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.