Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the underground resistance against digital content restrictions in public libraries, examining creative solutions to combat corporate control and ensure open access to knowledge.
Explore the cybersecurity challenges of remotely controlled industrial assets, examining real-world incidents and practical mitigation strategies for protecting critical infrastructure operations.
Discover how browser-based attacks exploit localhost services through a zero-day vulnerability, featuring live demonstrations of remote code execution and novel attack techniques targeting developers behind firewalls.
Dive into real-world social engineering tactics through a first-person narrative of complex red team operations, exploring methodologies for physical access and critical infrastructure penetration testing.
Dive into AWS security vulnerabilities through an analysis of 3.1M AMIs, exploring credential exposure risks, detection methodologies, and essential cloud security practices for preventing breaches.
Discover advanced exploitation techniques targeting NTFS and emulated filesystem vulnerabilities, exploring novel attack vectors that bypass Windows security measures and maintain system persistence.
Discover critical vulnerabilities in dormakaba Saflok hotel locks, including key card forgery techniques, security implications, and how to verify if your room's lock has been patched for protection.
Delve into AMD processor security vulnerabilities, exploring System Management Mode (SMM), CPU design flaws, and the methodology behind ring-2 privilege escalation exploits.
Explore the fascinating history of early microprocessors, focusing on the 6502 chip, its programming, and impact on vintage computing systems, with hands-on demonstrations and resources.
Dive into the fascinating world of eFuse memory security, exploring physical extraction techniques from basic decapsulation to advanced SEM analysis for accessing encrypted data storage.
Discover practical steps to advance your AppSec program through three maturity levels, with actionable strategies for immediate security posture improvement based on experience with 400+ companies.
Dive into advanced AWS security vulnerabilities, focusing on IAM role exploitation, confused deputy attacks, and critical misconfigurations that enable unauthorized cloud environment access.
Discover how to identify and exploit Bluetooth vulnerabilities in modern vehicles and flight systems, using BlueToolkit framework for testing, with practical tips and new attack vectors for security research.
Dive into real-world bug bounty hunting experiences, exploring high-severity vulnerabilities worth $10k-$60k, from simple RCE exploits to complex PII leakages, with detailed technical insights and lessons learned.
Uncover the gripping investigation of the XZ backdoor incident, exploring the mysterious maintainer Jia Tan, technical analysis of the compromise, and crucial lessons for open-source security.
Get personalized course recommendations, track subjects and courses with reminders, and more.