Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into OIDC security vulnerabilities, exploring authentication mechanisms, potential misconfigurations, and real-world attack vectors in cloud environments through CI/CD workflows and identity providers.
Dive into the security challenges of decentralized applications, exploring real-world vulnerabilities, threat modeling, and attack vectors in both Web2 and blockchain environments.
Delve into the behind-the-scenes journey of exploiting Xiaomi 13 Pro at Pwn2Own Toronto 2023, exploring regional security variations and the challenges of mobile device exploitation.
Uncover a critical side-channel vulnerability affecting AI assistants like ChatGPT, exploring how encrypted conversations can be intercepted and the broader implications for privacy and security.
Explore critical vulnerabilities in electric vehicle charging systems and learn specialized security testing techniques for EVCC and ISO 15118 protocols in charging infrastructure.
Explore the critical intersection of XR technology, accessibility, and privacy concerns for disabled users, examining key challenges and solutions for creating inclusive virtual experiences.
Explore physical and side-channel vulnerabilities in electronic smart locks, focusing on PIN and RFID security risks in organizational locker systems and shared spaces.
Discover how to detect and mitigate persistent threats on Draytek devices through firmware analysis, reverse engineering, and custom security module development for enhanced network protection.
Dive into the critical Outlook security vulnerabilities, exploring RCE exploits through COM objects, NTLM leaks, and essential mitigation strategies for enterprise protection.
Discover cutting-edge strategies for defending against XSS vulnerabilities, exploring Google's proven security implementations and future-focused approaches for protecting web applications at scale.
Discover the fundamentals of RFID technology, badge cloning, and security system vulnerabilities using tools like Proxmark and Flipper, while learning practical wireless communication hacking techniques.
Explore advanced malware detection techniques using network timing patterns and Python, learning to identify malicious behavior through transaction intervals rather than traditional code signatures.
Uncover critical security vulnerabilities in Google's Quick Share protocol, including an RCE attack chain, HTTPS MITM techniques, and protocol analysis for both Windows and Android platforms.
Gain insights into the evolution of bug bounty hunting through a decade-long journey, from basic vulnerability reporting to crafting critical impact chains, with perspectives from both hunter and triage sides.
Dive into advanced techniques for identifying and reverse engineering frozen MicroPython modules in firmware using Ghidra, focusing on bytecode analysis and module reconstruction methods.
Get personalized course recommendations, track subjects and courses with reminders, and more.