Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Demystifying elliptic curve cryptography: explore its applications in HTTPS, Bitcoin, and beyond. Learn about point addition, ECDH, digital signatures, and post-quantum algorithms without deep mathematical knowledge.
Exploits in wetware: social engineering techniques, OSINT strategies, and defensive measures against human vulnerabilities in cybersecurity, based on real-world experiences.
Explore native hooking on Android emulators, understanding process start routines and emulation strategies. Learn why existing frameworks fail and how to create one that works for game cheating.
Analyze hundreds of data breach disclosures to understand common vulnerabilities, focusing on preventable issues like patching and configuration failures, and their impact on enterprises.
Explore prototype pollution attacks in NodeJS, including APIs vulnerable to pollution, potential impacts, and defensive strategies. Learn from real-world examples and security research findings.
Explore a modified OpenSSH daemon that enhances post-exploitation capabilities, bypasses network restrictions, and provides reliable interactive shell access for penetration testing and security research.
Explore Android security challenges, common attack vectors, and best practices for secure development. Learn to protect consumers from evolving mobile threats.
Explore techniques for establishing covert command and control communication using webhooks, bypassing strict network defenses and avoiding detection in penetration testing scenarios.
Evade antivirus and security layers with polyglot files and assembly obfuscation. Learn to create undetectable payloads for penetration testing using a versatile tool.
Explore PoS system vulnerabilities, from physical access to data extraction. Learn about kiosk breakouts, privilege escalation, and real-world examples of critical security flaws in hotel management platforms.
Explore data science tools and techniques for cybersecurity, including statistical analysis and machine learning, to enhance threat detection and defense capabilities in large-scale corporate environments.
Explore Canada's expanded surveillance laws, media coverage, court cases, and future implications for cybercrime investigations and individual privacy rights.
Explore automatic exploit generation through program analysis techniques, including instrumentation and symbolic execution, with practical demonstrations and tool insights.
Explore cache timing covert channels in x86 multi-core systems, learning techniques for inter-VM data exfiltration and reverse shell establishment using shared resources and architecture imperfections.
Explore privacy, surveillance, and oversight in the digital age, examining historical context, legal frameworks, and democratic principles shaping modern data collection practices.
Get personalized course recommendations, track subjects and courses with reminders, and more.