Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore satellite communication vulnerabilities and cutting-edge security strategies to protect space-based assets from cyber threats, jamming, spoofing, and data interception.
Discover how PHUZZ, an open-source prototype, enables coverage-guided fuzz testing for PHP web applications, outperforming popular scanners in detecting vulnerabilities and uncovering CVEs in WordPress plugins.
Discover how to modify an NRF USB dongle for Flipper Zero compatibility and explore OpenThread technology, including network configuration, vulnerability assessment, and practical applications like TCP port scanning.
Discover research techniques and 0-day vulnerabilities in open-source identity providers Keycloak and Authentik, including ORM Leaks and web race conditions for security professionals.
Dive into the world of fuzzing WebAssembly-based smart contracts with Phink, an open-source fuzzing engine built on AFL++ for testing Rust smart contracts developed with ink!, addressing unique blockchain security challenges.
Explore practical software countermeasures for defending against hardware glitch attacks with insights from Arshid and Chinmay at Nullcon Goa 2025.
Discover Project Dusseldorf, a versatile out-of-band appsec platform used by Microsoft teams to detect vulnerabilities like SSRF, XXE, SSTI, XSS, and RCE at cloud scale, now being open-sourced.
Explore Windows keylogger detection techniques targeting both historical and current keylogging methods in this comprehensive security presentation by Asuka.
Explore the security vulnerabilities in smart weighing machines through reconnaissance, hardware analysis, firmware reverse-engineering, and API exploitation, revealing critical flaws in IoT devices from Chinese and European manufacturers.
Explore threat modeling techniques for modern AI systems, focusing on MLOps security vulnerabilities and defensive strategies in this insightful presentation.
Explore the research behind Ecovacs robot hacking incidents, including vulnerability discovery methods, security implications, and lessons for preventing future exploits and responsible disclosure practices.
Explore the security challenges of EKYC systems and learn effective strategies for protecting digital identity lockers in this insightful presentation by Kartik Lalan.
Discover how to build robust security engines for the future in this keynote by Daniel Cuthbert at Nullcon Goa 2025.
Explore how zero-knowledge proofs through zkVMS and zkTLS can revolutionize bug bounty programs by enabling cryptographic proof of vulnerabilities without revealing sensitive exploit details.
Explore the current landscape of iOS jailbreaking tools, vulnerabilities, and techniques for bypassing Apple's security features like KPP, PAC, and PPL in this comprehensive overview.
Get personalized course recommendations, track subjects and courses with reminders, and more.