Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore decompilation basics, popular tools, and the Hex-Rays Decompiler. Learn about FIDL, a new library simplifying decompiler API usage, with practical examples and demos.
Explore Android malware techniques, from repackaging apps to sophisticated rooting trojans. Learn about click fraud, exploit bundling, and persistence mechanisms used by malicious actors.
Unveiling secret flaws in DRAM RowHammer mitigations, exploring Target Row Refresh implementation, and introducing TRRespass: a RowHammer fuzzer for creative hammering patterns to bypass protections.
Explore adversary emulation to enhance blue team performance, addressing cybersecurity expert shortages and evolving attack methods. Learn to design attack playbooks and test security products effectively.
Introducing Bugrank: an open-source community bug bounty platform. Explore its design, architecture, and functions. Learn how to set up your own bug reporting system for enhanced cybersecurity.
Explore automated firmware emulation techniques for embedded systems, covering root filesystem location, architecture identification, and emulation methods using open-source tools and scripts.
Comprehensive analysis of cloud security vulnerabilities, real-world attack scenarios, and best practices for securing cloud deployments. Covers data exposure, access control issues, and attacker exploitation techniques.
Explore file system vulnerability research through fuzzing techniques on BSD systems. Learn to identify attack surfaces, automate testing, and uncover security bugs in kernel implementations.
Explore macOS vulnerabilities through Office macros, analyzing recent attacks and detailing a novel exploit chain that can infect fully-patched systems with minimal user interaction.
Explore macOS directory permission vulnerabilities, from arbitrary overwrites to privilege escalation. Learn techniques to control file contents and understand the intricacies of macOS security.
Análisis detallado de la evolución reciente de los cargadores de malware, sus técnicas de evasión y distribución, y métodos para detectarlos y analizarlos en entornos corporativos.
Explore vulnerabilities in cloudless smart door systems for large buildings, focusing on IP-gateway security risks and potential exploits in intercom-IP integration.
Explore open source security challenges, variant analysis techniques, and real-world case studies. Learn about vulnerabilities in popular software and gain insights from industry expert Fermin J. Serna.
Unveiling RIDL attacks: exploiting speculative execution vulnerabilities in modern CPUs to steal in-flight data across security boundaries, bypassing existing mitigations and compromising system security.
Comprehensive guide to LoRaWAN security auditing, covering vulnerabilities, testing methods, and new tools. Provides practical insights for securing IoT deployments in smart cities and industries.
Get personalized course recommendations, track subjects and courses with reminders, and more.