Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how Relative Path File Injection attacks can turn trusted websites into malware delivery platforms, exploring detection methods and real-world implementations through practical demonstrations.
Uncover groundbreaking vulnerabilities in aviation's TCAS II collision avoidance system, exploring RF attack methods that can manipulate traffic advisories and disable critical safety features in aircraft.
Master the art of mechanical safe manipulation through expert techniques, wheel isolation methods, and vulnerability analysis for Group 2 locks, enhancing your locksport knowledge.
Discover how lasers and physics enable remote keystroke detection through windows, exploring side-channel attacks, signal interpretation, and modern espionage techniques for data extraction.
Dive into the security vulnerabilities of Ecovacs robots, exploring broken encryption, unauthorized camera access, and privacy concerns while learning techniques for privacy-preserving usage and rooting.
Dive into the technical investigation of USPS-themed SMS phishing attacks, exploring vulnerability exploitation, reverse engineering techniques, and methods to combat scammer operations targeting US consumers.
Discover advanced memory forensics techniques to detect and analyze EDR-evading malware, including system call manipulation, module overwriting, and debug register abuse.
Uncover critical AWS vulnerabilities and security insights through real-world examples of shadow resource exploitation, featuring detection methods, privilege escalation techniques, and best practices for cloud security.
Dive into the critical Outlook security vulnerabilities, exploring remote code execution exploits through COM objects, NTLM leaks, and essential mitigation strategies for enterprise protection.
Discover how to build and implement a modular wireless survey system using PacketGlass for efficient collection, visualization, and analysis of massive wireless network data through Elastic-based analytics.
Explore fascinating unsolved codes and ciphers throughout history, from CIA's Kryptos sculpture to mysterious WWII pigeon messages and encrypted postcards from notable figures.
Discover how data science transforms overwhelming security data into actionable insights, helping identify coordinated attacks amid false positives using open-source models and security knowledge encoding.
Dive into the complex landscape of aviation cybersecurity policy, exploring technical challenges and regulatory frameworks shaping the future of civil aviation safety across the US and Europe.
Explore the critical intersection of human dignity, AI, and tech policy, examining how data-driven technologies impact individual rights and societal freedoms while discussing protective measures and solutions.
Discover how to bypass airgapped systems and execute wireless payloads using affordable Arduino hardware and basic coding techniques for penetration testing medical devices.
Get personalized course recommendations, track subjects and courses with reminders, and more.