Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Azure AD security vulnerabilities, privilege escalation techniques, and mitigation strategies. Learn to protect your organization's cloud infrastructure from potential attacks and misconfigurations.
Explore 5G network security challenges, solutions, and design principles. Learn about industry collaboration, in-depth defense, zero-trust, and adaptive security for controllable 5G risks.
Explore modern post-exploitation techniques in cloud environments, focusing on IAM vulnerabilities in enterprise apps. Learn attacker strategies, discovery methods, and evasion tactics against security tools.
Explore the potential of smart contracts as anonymous rootkit C2 infrastructure, demonstrating their immutability, anonymity, and scalability for controlling infected devices remotely.
Explore electro-optical sound eavesdropping techniques, including Lamphone and Glowworm attacks, to recover speech from physical and virtual conversations using light analysis.
Coverage-guided binary fuzzing tool for vulnerability discovery, featuring test management, mutation tracking, and visualization. Supports multiple architectures and debuggers, with successful application in finding software vulnerabilities.
Framework for examining mobile app privacy, focusing on user control over data, consent, and compliance with global regulations. Includes automatic tools and findings from top apps, highlighting pervasive privacy issues.
Exploring innovative techniques to fuzz RDP protocol using WinAFL, uncovering vulnerabilities in both client and server implementations for enhanced remote connection security.
Exploración detallada de problemas de seguridad en WebViews de aplicaciones móviles, incluyendo validación de URL, aislamiento y filtración de datos. Incluye el descubrimiento de CVE-2021-21136 en Chromium.
Explore advanced malware protocol simulations for distributed networks, enhancing threat detection and defense strategies through realistic Command & Control traffic replication without using actual malware.
Explore new methods for escaping privileged runc containers, focusing on cloud security vulnerabilities and innovative exploit techniques in container environments.
Explore on-premise protective DNS using RPZ for network security without cloud reliance. Learn motives, methods, and implementation from internet pioneer Dr. Paul Vixie.
Exploración profunda de vulnerabilidades en controladores Modicon PAC de Schneider, analizando protocolos de comunicación privados y mecanismos de protección por contraseña. Incluye demostraciones de ataques y recomendaciones defensivas.
Explore static binary instrumentation with IDA2Obj, a tool for dumping object files from executables. Learn implementation, challenges, and integration with fuzzing engines for efficient code coverage collection.
Innovative approach to offensive CI/CD pipelines for red and purple team operations, automating weaponization and evasion techniques using Infrastructure as Code and Kubernetes.
Get personalized course recommendations, track subjects and courses with reminders, and more.