Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Delve into Windows security mechanisms through an analysis of Sudo for Windows, exploring process elevation, ALPC services, and Rust-Windows API interactions while uncovering potential security vulnerabilities.
Dive into critical security vulnerabilities affecting major car manufacturers' web applications, exploring real-world attacks, impact chains, and the importance of responsible disclosure policies.
Discover advanced process injection techniques using return-oriented programming (ROP), including unique string comparison solutions, multiple WinAPI patterns, and practical methodologies for reliable implementation.
Discover how to transform your car into a unique game controller using Python, exploring vehicle networks, CAN bus communication, and diagnostic interfaces for an innovative gaming experience.
Delve into modern cyber warfare insights from General Nakasone's leadership at NSA and U.S. Cyber Command, exploring national security strategies, threat responses, and the future of digital conflict.
Delve into advanced Windows exploitation techniques, focusing on stealthy shim manipulation and Office infrastructure vulnerabilities for code injection and privilege escalation attacks.
Dive into automotive cybersecurity challenges through real-world stories and demonstrations, exploring vehicle architecture vulnerabilities and industry practices while witnessing live ECU hacking and security testing scenarios.
Discover techniques for exploiting email address parsing vulnerabilities to bypass security controls, spoof domains, and access protected systems through RFC-compliant manipulation.
Discover practical techniques for identifying and exploiting DoS vulnerabilities in bug bounty programs, covering N+1 errors, GraphQL crashing, and Cache Poisoning with real-world examples and responsible reporting practices.
Uncover the hidden challenges, secrets, and realities of bug bounty programs through expert insights on navigating relationships between hunters, clients, and platforms.
Explore advanced SQL injection techniques through protocol-level query smuggling, revealing how attackers can bypass security measures and exploit database connections for authentication breaches and data theft.
Dive into hardware hacking techniques for extracting firmware and generating Software Bill of Materials (SBOM) from a WiFi router, exploring vulnerability discovery through practical disassembly methods.
Explore the enduring relevance of mainframe technology, its modern applications, and essential security measures for protecting these powerful computing systems in today's digital landscape.
Discover the complete badge-making journey, from creative concept to mass production, including circuit design, firmware development, and practical manufacturing insights.
Explore the cybersecurity challenges and policy implications of clean energy adoption, focusing on supply chain vulnerabilities, security strategies, and balancing economic pressures with sustainability goals.
Get personalized course recommendations, track subjects and courses with reminders, and more.