Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores coordinated military efforts in the GCC region, focusing on biological weapons development and information warfare strategies for national defense. Insights from field experience shared.
Hands-on workshop on extracting and emulating ARM IoT firmware using ARMX. Covers firmware extraction, unpacking, file system analysis, and device emulation. Practical experience with real IoT devices and tools.
Explore IoT security with EXPLIoT framework. Learn key concepts, tools, and protocols for penetration testing and exploit development in IoT environments. Hands-on workshop for security researchers and pentesters.
Explore advanced techniques to bypass Endpoint Detection and Response (EDR) systems, including PID spoofing, DLL blocking, and syscalls. Learn from experts and get inspired to innovate in cybersecurity.
Explores attack surfaces and vulnerabilities in automated manufacturing systems, discussing potential impacts on product quality, plant safety, and industrial espionage in Industry 4.0 environments.
Exploring fuzzing techniques for SAP network services, overcoming challenges in performance, protocol complexity, and crash reproduction to discover critical vulnerabilities in custom network protocols.
Explore innovative approaches to cybersecurity for complex systems using knowledge graphs, graph theory, and machine learning. Learn to plan and execute effective engagements across diverse technological landscapes.
Exploring the risks of BYOD policies and the potential for malicious apps to create targeted attacks on corporate devices, highlighting covert channels and opportunistic permissions.
Explores physical layer security challenges and solutions for embedded devices, focusing on authentication schemes, feature extraction from wireless modules, and practical implementation methodologies.
Exploring Telegram's animated stickers implementation in E2EE chats, uncovering 13 zero-day vulnerabilities through advanced fuzzing techniques and binary exploitation.
Explore innovative machine learning techniques for detecting malicious infrastructure in HTTP responses, focusing on uniqueness and header order features to identify command and control servers.
Exploring techniques for reverse engineering Golang binaries using Ghidra, focusing on IoT malware analysis, overcoming Go-specific challenges, and addressing recent obfuscation trends.
Exploring key trends in alternative payments and cryptocurrencies, including industry perspectives, future directions, and challenges for investors in this rapidly evolving financial landscape.
Discover the creation process of HITB's cutting-edge electronic badge, featuring insights from Techmaker on design, functionality, and innovative features for tech enthusiasts.
Discover advanced techniques for identifying and mitigating critical vulnerabilities in embedded systems, focusing on NicheStack TCP/IP stack vulnerabilities and automated vulnerability detection methods.
Get personalized course recommendations, track subjects and courses with reminders, and more.