Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in Building Management Systems, their impact on critical facilities, and the research process behind discovering these security flaws in various BMS components and products.
Detailed analysis of vulnerabilities in Siemens SIMATIC PLC protection mechanisms, including hacking methods and security recommendations for various models. Essential for industrial control system security professionals.
Explore API security challenges in microservices architectures and learn strategies for distributed security, including gateways, service mesh, authentication, and network segmentation.
Explore critical security vulnerabilities in DICOM servers, protocols, and libraries used in medical imaging systems. Learn to identify and fix bugs in the DICOM ecosystem.
Explore blockchain technology as a cutting-edge defense mechanism in cybersecurity, examining its potential applications and impact on digital security strategies.
Explore how vulnerabilities propagate from Ethereum to Layer-2 blockchains, featuring BlockScope tool analysis and discovery of 15 zero-day vulnerabilities across BSC, Optimism, Base, and Mantle networks.
Uncover critical security vulnerabilities in Telit cellular modems, including remote code execution flaws, SMS-based attacks, and MIDlet compromise methods that affect millions of connected devices.
Delve into HTTP Request Smuggling vulnerabilities, exploring real-world cases of authentication bypass and remote code execution in enterprise applications, with practical detection and mitigation strategies.
Discover critical insights into large-scale secret scanning across NPM packages, WordPress plugins, and Ruby Gems, exploring supply chain vulnerabilities and implementing preventive measures in CI/CD pipelines.
Discover advanced techniques for detecting malicious Python projects using AST Transformers and machine learning, focusing on obfuscation methods and countermeasures in cybersecurity.
Discover how to exploit microphone nonlinearity and build ultrasonic jammers for enhanced privacy protection, exploring advanced counter-surveillance techniques and practical implementations.
Delve into advanced VMware device virtualization security, exploring undiscovered attack surfaces in VMKernel, USB, and SCSI systems while learning vulnerability detection techniques from expert researchers.
Explore the evolving role of modern CISOs, combining technical expertise with strategic management to navigate cybersecurity challenges, budget allocation, and breach management effectively.
Explore Android app vulnerability detection through a novel OS with MRI-like functionality, enabling non-invasive code analysis and data flow tracing for enhanced mobile security.
Explore GPTHound, an AI-powered tool enhancing Active Directory security assessments. Learn how it simplifies query generation, asset classification, sensitive information detection, and attack path analysis across multiple languages.
Get personalized course recommendations, track subjects and courses with reminders, and more.