Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover the fascinating story of encrypted 1850s newspaper ads used to communicate with an Arctic explorer, their eventual decryption, and the innovative worldwide communication system they represented.
Explore critical vulnerabilities in EV charging and solar system APIs, examining potential cyber threats to power grid infrastructure and the urgent need for enhanced security measures.
Explore how NFTs can be weaponized as attack vectors for C2 commands, featuring the mFT tool for creating malicious payloads and understanding blockchain-backed threats in cybersecurity.
Delve into a gripping firsthand account of infiltrating LockBit ransomware syndicate, uncovering operational tactics, leadership dynamics, and the successful unmasking of its notorious leader LockBitSupp.
Dive into the technical analysis of CVE 2023-52709, exploring Bluetooth stack vulnerabilities, their impact on automotive security, and essential mitigation strategies for RPA generation failures.
Explore the security vulnerabilities of voice verification systems through deep learning voice cloning techniques, including practical demonstrations, risk assessment, and defensive countermeasures.
Explore how holographic teleportation revolutionizes space communication and medical practices, from remote surgeries to expert consultations across vast distances.
Discover how LLM-powered honeypot Galah revolutionizes web security by dynamically simulating multiple applications and analyzing attacker behavior through intelligent HTTP response generation.
Explore modern application security challenges and solutions in cloud-native environments, from threat modeling to real-time detection, with emphasis on securing 'everything as code' ecosystems.
Dive into Windows kernel security through ALPC and RPC services, exploring vulnerability exploitation techniques, security bypass methods, and system privilege escalation strategies.
Explore aircraft cybersecurity through PKI systems, from software protection to network authentication, and understand emerging quantum computing threats to aviation security.
Dive into advanced exploitation techniques for JavaScript vulnerabilities, focusing on Prototype Pollution attacks and RCE chains through real-world Kibana Bug Bounty examples and defense strategies.
Discover how to build a custom ADS-B aircraft tracking system using cost-effective hardware alternatives, implementing Linux and signal processing for efficient aircraft monitoring and visualization.
Discover groundbreaking security vulnerabilities in VSAT satellite modems through reverse engineering, exploring software stack exploits and demonstrating wireless signal injection attacks for remote access.
Explore the complexities of AI vulnerability disclosure, focusing on ethical challenges, bias management, and security implications while examining real-world cases and solutions for responsible reporting.
Get personalized course recommendations, track subjects and courses with reminders, and more.