Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Delve into manufacturing cybersecurity challenges, focusing on ransomware threats, network vulnerabilities, and automation risks while exploring protective strategies for operational technology environments.
Dive into advanced hardware hacking techniques to exploit Apple's ACE3 USB-C controller, using reverse engineering, side-channel analysis, and fault injection to gain code execution access on iPhone 15.
Delve into groundbreaking research revealing security vulnerabilities in HID's iCLASS SE platform, exploring reverse engineering techniques and critical mitigation strategies for electronic access control systems.
Dive into industrial VPN gateway vulnerabilities through detailed analysis of security flaws, session hijacking risks, and hardware security bypass techniques in remote access systems.
Explore how Pacific Northwest National Lab leverages XR technology for virtual twins, hazardous environment simulations, and security threat communications in national security operations.
Master essential best practices for implementing secure physical access control systems, from tamper-resistant wiring to clone-proof badges and controller equipment management.
Discover how Schneider Electric efficiently manages software security through SBOM collection and implementation, with real-world examples from Log4j and OpenSSL vulnerability responses.
Dive into the evolution of Internet protocols, from IPv4 to IPv6, understanding core networking concepts and security implications for modern infrastructure deployment.
Discover how a weaponized MySQL honeypot server exploits vulnerabilities to counter-attack malicious clients, featuring innovative use of CVE-2023-21980 and CVE-2024-21096 for defensive security research.
Dive into the mechanics of Tor's network infrastructure, exploring metrics collection, attack mitigation, and community management strategies for maintaining this vital privacy ecosystem.
Explore the complexities of AI vulnerability disclosure, examining ethical challenges, bias concerns, and security implications while learning practical approaches to responsible vulnerability management.
Delve into reverse engineering RoboForm's password generator vulnerability, exploring techniques to regenerate historical passwords and recover locked Bitcoin wallets through systematic analysis.
Uncover the fascinating story behind Anom, the FBI-run encrypted phone network that infiltrated criminal organizations, exploring technical details, operational challenges, and surveillance implications.
Learn to design and customize electronic conference badges using OpenTaxus - from hardware modifications in KiCAD to software changes in CircuitPython, plus cost management and production logistics.
Explore the evolution of binary exploitation, memory safety challenges, and modern protection mechanisms in operating systems, focusing on Windows security mitigations and their effectiveness.
Get personalized course recommendations, track subjects and courses with reminders, and more.