Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore kernel exploitation using a filesystem fuzzer, uncovering vulnerabilities and demonstrating R/W primitive attacks and control flow hijacking in Linux systems.
Exploring vulnerabilities in Terminal Management Systems for card payments, revealing potential security risks in acquiring bank infrastructure and POS terminals.
Explore SAP vulnerabilities: authentication bypass, OS command injection, and privilege escalation. Learn to decrypt sensitive files, manipulate security reports, and implement protective measures.
Explore Jenkins vulnerabilities and exploitation techniques, focusing on two critical flaws that allow unauthenticated attackers to gain admin access and control entire infrastructures.
Unveiling critical vulnerabilities in ERP systems, demonstrating how attackers can manipulate financial processes and exploit Oracle's ERP for unauthorized monetary gains without detection.
Análisis detallado de ataques APT a la industria de semiconductores en Taiwán, enfocándose en Operation SemiChimera. Explora técnicas, tácticas y motivaciones de los atacantes, ofreciendo insights para mejorar la ciberseguridad del sector.
Explore two supply chain attack strategies by BARIUM APT group, analyzing real-world cases and their tactics. Learn defensive measures against these sophisticated cyber threats.
Exploring deficiencies in automatic vulnerability mining tools and proposing a new technique to improve software security through analysis of popular tools and creation of challenging example codes.
Análisis de vulnerabilidades comunes en protocolos de red ICS, incluyendo públicos y privados. Demuestra ataques potenciales como inyección de comandos y sniffing de tráfico sin cifrado en infraestructuras crÃticas.
Exploring DevSecOps and Chaos Security Engineering to integrate business, development, and security teams for effective product security and staying ahead of adversaries.
Explore innovative malware techniques using HTTP statuses as C2 commands and compromising TLS encryption. Learn about COMPFun's evolution and its impact on cybersecurity.
Explore serverless security vulnerabilities and defenses across AWS, Azure, and GCP. Learn about dependency poisoning, validation errors, and insecure defaults with practical demos and prevention strategies.
Python-based tool for enhancing OPSEC by autonomously posting on social media, using NLP and ML to mimic user behavior. Ideal for those needing to abandon targeted accounts without alerting adversaries.
Explore SQLite vulnerabilities, auditing strategies, and fuzzing techniques. Learn about Magellan 2.0, shadow tables, and bypassing defense mechanisms for remote code execution in Chrome and SQLite binaries.
Explore car hacking essentials: CAN types, UDS, ISO TP, MOST/LIN/Flexray/Automotive Ethernet protocols. Gain insights from industry experts in this virtual lab on automotive cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.