Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring cloud-scale deception technology to track and analyze attackers, enhancing Azure security through psychological and technical approaches for better threat intelligence and user protection.
Explore challenges in 802.11ac network monitoring and learn to create a custom monitoring platform using repurposed access point hardware. Gain practical knowledge and scripts for implementation.
Explore WarRoaming techniques, custom gear, and strategies for efficient WiFi discovery. Learn from a top-ranked WiGLE.net contributor's journey and insights into wireless surveying and intelligence gathering.
Exploring vulnerabilities in LTE Public Warning Systems, demonstrating how fake emergency alerts can be created using low-cost hardware, potentially causing panic or system paralysis.
Exploring infrared technology's resurgence in smart devices, examining potential security vulnerabilities, and demonstrating innovative attack vectors using IR transmitters and receivers.
Explore telecom network vulnerabilities, attack vectors, and security best practices in this comprehensive overview of mobile infrastructure risks.
Explore smart speaker privacy vulnerabilities, including skill squatting and eavesdropping, and learn about potential solutions like hardware mic disconnects and user awareness.
Explora la seguridad y verificabilidad del voto electrónico, proponiendo un innovador protocolo de autenticación de dos factores para garantizar la integridad electoral sin comprometer la privacidad.
Explore DHCP vulnerabilities and exploits in popular implementations, including dnsmasq, ISC DHCP, and systemd networkd, with insights on architecture and attack techniques.
Explore real-time packet processing using FPGAs, focusing on Ethernet connections, FPGA architecture, and implementing network applications with hardware-level optimizations.
Explore NTLM relay attacks, their evolution, and modern exploitation techniques. Learn about vulnerabilities in Windows protocols and browsers, with insights on defense strategies.
Explore WebGL vulnerabilities and GPU-based Rowhammer attacks in this technical deep dive on exploiting graphics hardware for security breaches.
Exploración detallada de vulnerabilidades en redes inalámbricas industriales, enfocándose en WirelessHART e ISA100.11a. Incluye demostraciones prácticas de ataques y herramientas de sniffing.
Explore techniques for extracting messages from iCloud, covering iCloud security basics, data protection, and accessing stored messages. Learn about encryption, token policies, and iCloud sync settings.
Explore IPv6 security implications, addressing schemes, and potential vulnerabilities. Learn about honeypot servers, machine learning applications, and techniques for identifying aliased networks in IPv6 environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.