Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced machine learning techniques for user behavior anomaly detection in cybersecurity, covering feature selection, data quality, behavioral whitelisting, and neural network predictions.
Revealing security vulnerabilities in hospital networks through penetration testing, exposing risks in medical devices, software, and systems for improved healthcare cybersecurity.
Explore product security strategies, including risk management, automation, and attack surface reduction. Learn how to integrate security into development processes and foster a security-conscious culture within organizations.
Comprehensive analysis of malicious Office documents, covering macro analysis, obfuscation techniques, shellcode execution, and OS X targeting. Equips attendees to handle various maldoc threats.
Explore modern pentesting techniques, tools, and procedures for efficient data processing and analysis. Learn about Jython, PyInstaller, CSVKit, Impacket, Frida, and GNU Parallel to enhance your security auditing skills.
Explore in-depth IoT device security, including hardware hacks, forensic approaches, and exploitation techniques for routers, IP cameras, and smart TVs. Learn practical skills for conducting your own device hacking.
Exploration of rogue hosting providers' behaviors, patterns, and impact on cybercrime. Insights into threat intelligence techniques for identifying and combating abusive hosting services, with focus on Dutch infrastructure.
Explore radio exploitation fundamentals, wireless attack types, and live demos. Learn to bridge IP network skills to wireless domain, understanding mechanics and awareness of radio-based network vulnerabilities.
Explore neural network-based fuzzing for web apps, enhancing coverage and efficiency in identifying vulnerabilities through machine learning and intelligent payload generation.
XFLTReaT: An open-source tunnelling framework for bypassing network restrictions. Simplifies development of custom tunnels, supports various protocols, and offers easy configuration and use for network professionals.
Exploración detallada de vulnerabilidades en sistemas de punto de venta, demostrando vectores de ataque y discutiendo la seguridad de sistemas POS modernos, con énfasis en SAP POS.
Explore advanced red team tactics, including domain fronting, ADFS attacks, and sandbox evasion. Gain insights into offensive and defensive strategies for the coming year.
Investigación detallada sobre micrófonos ocultos modernos, sus caracterÃsticas y métodos de detección, con experimentos prácticos y desarrollo de una herramienta de código abierto basada en SDR para detectarlos.
Revealing 200+ vulnerabilities in Samsung Android phones, focusing on authentication bypass and system crashes. Demonstrates fragmentation issues and compares with Google's AOSP, offering insights into Android security.
Explore machine learning and natural language processing for cybersecurity intelligence, leveraging unstructured data from social media and online sources to gain an edge in threat identification.
Get personalized course recommendations, track subjects and courses with reminders, and more.