Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore challenges faced by CISOs, including threat landscapes, expertise shortages, and compliance burdens. Learn effective strategies for building defendable systems and functioning on the razor's edge of cybersecurity.
Reimplementing Windows RPC in .NET for privilege escalation, covering ALPC implementation, NDR parsing, and PowerShell integration. Includes bug discovery and tooling demonstration.
Explore blockchain's impact on currency, governance, and global power dynamics. Discover how this technology challenges traditional financial systems and reshapes national sovereignty.
Explore ICS/SCADA cybersecurity threats, attack vectors, and protection strategies. Learn to analyze industrial protocols, write exploits, and implement effective defense measures for critical infrastructure.
Overview of recent APT attacks on cryptocurrency exchange employees, from spear phishing to Firefox 0-day exploit and malware stages. Compares perspectives of victim, attacker, and security team.
Explore the evolution of cybersecurity, from hacking to bug bounties, and its impact on policy, workforce, and vulnerability management. Gain insights into future challenges and solutions.
Explore a framework for controlled ransomware testing, focusing on decoupled components for detonation and detection. Learn about design, development, and automated testing methodologies for behavioral ransomware analysis.
Practical guide to automotive security, focusing on CAN bus hacking. Learn to reverse-engineer packets, identify arbitration IDs, perform replay attacks, and explore hardware tools for vehicle network security.
Insight into Middle Eastern threat actor MuddyWater's tactics, including spear-phishing, backdoors, and cyber espionage. Explores recent tool evolution, obfuscation techniques, and prevention strategies.
Exploración detallada de una vulnerabilidad de ejecución remota de código en el cliente Zoom para macOS, incluyendo técnicas de ingenierÃa inversa y explotación aplicables a otras aplicaciones.
Exploring cybersecurity challenges in physical systems, this talk examines root causes of vulnerabilities and proposes systemic approaches to embed security in design, moving beyond fear-based tactics.
Explore 4G LTE vulnerabilities through femtocell hacking, including rooting techniques, portability modifications, and man-in-the-middle attacks. Learn to exploit small cell access networks for security research.
Exploiting microcode loader vulnerability to downgrade CPU microcode, enabling attacks on Intel security technologies like Boot Guard and TXT by loading older, vulnerable versions of Authenticated Code Modules.
Explore creating a fuzzer for Diameter protocol in LTE networks, covering architecture, challenges, and lessons learned in discovering vulnerabilities in telecom equipment.
Exploring CISO challenges: threat landscape, expertise shortage, product obsolescence, and compliance burdens. Insights from effective CISOs on navigating these complexities in enterprise defense.
Get personalized course recommendations, track subjects and courses with reminders, and more.