Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into the technical investigation of USPS-themed SMS phishing attacks, exploring vulnerability exploitation, reverse engineering techniques, and methods to combat scammer operations targeting US consumers.
Discover advanced memory forensics techniques to detect and analyze EDR-evading malware, including system call manipulation, module overwriting, and debug register abuse.
Uncover critical AWS vulnerabilities and security insights through real-world examples of shadow resource exploitation, featuring detection methods, privilege escalation techniques, and best practices for cloud security.
Dive into the critical Outlook security vulnerabilities, exploring remote code execution exploits through COM objects, NTLM leaks, and essential mitigation strategies for enterprise protection.
Discover how to build and implement a modular wireless survey system using PacketGlass for efficient collection, visualization, and analysis of massive wireless network data through Elastic-based analytics.
Explore fascinating unsolved codes and ciphers throughout history, from CIA's Kryptos sculpture to mysterious WWII pigeon messages and encrypted postcards from notable figures.
Discover how data science transforms overwhelming security data into actionable insights, helping identify coordinated attacks amid false positives using open-source models and security knowledge encoding.
Dive into the complex landscape of aviation cybersecurity policy, exploring technical challenges and regulatory frameworks shaping the future of civil aviation safety across the US and Europe.
Explore the critical intersection of human dignity, AI, and tech policy, examining how data-driven technologies impact individual rights and societal freedoms while discussing protective measures and solutions.
Discover how to bypass airgapped systems and execute wireless payloads using affordable Arduino hardware and basic coding techniques for penetration testing medical devices.
Explore the historical evolution of cryptographic terminology, from classical definitions to modern usage, while examining the crucial balance between data security and privacy protection.
Explore GPS spoofing's critical impact on aviation systems, focusing on time manipulation vulnerabilities and their consequences for aircraft communications and navigation security.
Discover how to monitor and control mobile device network traffic using private APNs, enabling affordable security testing and traffic analysis for IoT and mobile devices on 4G/5G networks.
Uncover security vulnerabilities in goTenna Pro radio's mesh network encryption, including tracking, interception, and message injection methods, with practical demonstrations and mitigation strategies.
Discover how hardware hacking techniques expose vulnerabilities in car key systems by analyzing learning codes, using logic analyzers and SDR tools to duplicate signals and gain unauthorized access.
Get personalized course recommendations, track subjects and courses with reminders, and more.