Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to leverage bug bounty programs to kickstart a career in cybersecurity and become a competitive candidate for top tech companies in Silicon Valley.
Explore OWASP ASVS 4.0 updates, new controls, and industry applications. Learn about modern web app security, architecture changes, and a novel attack technique.
Explore side-channel attacks and machine learning in cybersecurity with expert Stjepan Picek. Learn practical techniques, profiling methods, and key outcomes in this informative webinar.
Explore techniques for detecting vulnerabilities in Android kernel drivers using static analysis and fuzzing, with focus on DR.CHECKER and DIFUZE tools.
Explore IMSI catcher detection techniques, evaluate Android apps' effectiveness, and learn about White-Stingray tool for bypassing detectors. Discover vulnerabilities and best practices for mobile security.
Explore comprehensive hacker techniques in mobile networks, covering SS7 vulnerabilities, subscriber tracking, call interception, and security measures to counter evolving threats.
Explore vulnerabilities in digital banking systems, including passbook printers, e-wallets, and Aadhaar-based KYC, revealing potential security risks in India's cashless economy initiatives.
Explore a custom bootkit for U-Boot devices, its persistence techniques, and implications for IoT security. Learn about backdooring methods and potential countermeasures.
Learn effective strategies for participating in bug bounty programs, including handling duplicates, prioritizing submissions, and escalating issues. Gain insights into common challenges and best practices.
Explore advanced web application security techniques using Runtime Application Self Protection (RASP) to prevent code injections and other vulnerabilities through dynamic analysis and patching.
Comprehensive exploration of ATM security vulnerabilities, covering kiosk mode bypass, privilege escalation, software flaws, network security, and device management. Insights for enhancing ATM protection.
Learn Azure bug bounty strategies from a Microsoft expert, covering attack surfaces, past payouts, and how to start hunting for vulnerabilities in cloud infrastructure.
Explore DevOpSec practices for rapid, secure AWS deployments. Learn collaborative strategies for development, operations, and security teams to achieve compliance in agile environments.
Explore Facebook's approach to enhancing security through developer-focused tools and practices, addressing vulnerability prevention and detection in large-scale software development.
Explore IoT security vulnerabilities using SDR and GNU Radio. Learn to intercept, sniff, and hijack wireless devices like drones and keyboards through practical demonstrations and attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.