Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore adversarial attacks on autonomous vehicles, examining the gap between academia and industry, and discussing potential vulnerabilities in AI-driven transportation systems.
Explore the creation of a simple cryptocurrency hardware wallet, focusing on hardware acceleration, code optimization, and Bitcoin processing techniques.
Exploring iOS sandbox vulnerabilities through mach message IPC, revealing potential exploits in various daemons. Includes research tools and demonstrations of discovered vulnerabilities in Apple's mobile devices.
Exploración de vulnerabilidades en la automatización de redes LTE, demostrando métodos de ataque y discutiendo contramedidas para operadores y usuarios finales.
Exploring FILE structure exploitation in Glibc to bypass modern OS protections, demonstrating remote code execution techniques and File Stream Oriented Programming.
Explore blockchain vulnerabilities, smart contract issues, and topology attacks. Learn best practices for mitigating risks in decentralized systems and Ethereum-based platforms.
Explore cognitive automation and machine learning in cybersecurity, covering risk analytics, threat detection, and incident management. Learn how ML enhances fraud detection and security operations.
Explore advanced techniques for monitoring and injecting 64-bit code into WoW64 processes, overcoming security challenges and OS limitations to enhance application security.
Exploring Malaysia's data breach crisis, breach notification challenges, and the underground data trading community. Insights on improving breach notification laws and protecting citizen data.
Explore machine learning techniques for generic, static detection of mobile malware, focusing on Android but applicable to iOS. Learn about the research methodology, workflow, and results.
Demystifying deep web, dark web, and related terms. Clarifies misconceptions, explores definitions, and offers a new perspective on internet classification.
Cloud-based Yara scanner for efficient malware detection. Scans large malware libraries at high speeds, enhancing threat intelligence and APT hunting capabilities. Open-source project with live demo.
Exposing hidden exploitable behaviors in programming languages using differential fuzzing. Techniques for identifying undocumented functions, OS command execution vulnerabilities, and other security issues.
Exploración detallada del subsistema gráfico de Windows, vulnerabilidades del kernel y técnicas de escape del sandbox de Edge, con demostraciones de exploits para elevar privilegios desde el proceso de contenido de Edge a SYSTEM.
Explore Mallet, a new open-source intercepting proxy with a user-friendly interface, high performance, and extensive protocol support. Learn its advantages over existing tools and potential applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.