Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore p≡p's innovative approach to automating digital privacy, making end-to-end encryption and anonymity the default for everyone, regardless of technical expertise.
Explore Samsung bootloader security, uncovering hidden protocols and vulnerabilities. Learn about anti-tamper mechanisms, memory corruption, and techniques for unlocking Android devices.
Explore hardware security challenges, from supply chain vulnerabilities to chip-level attacks. Learn about emerging threats and best practices for securing technology stacks from silicon to software.
Explore Chrome's open-source Clusterfuzz system for real-time security bug detection, distributed fuzzing techniques, and insights into exploitable crash prevention across platforms.
Explore cold boot attacks on DDR2 and DDR3 RAM, revealing vulnerabilities in data retention after power loss. Learn techniques, results, and mitigation strategies for this cybersecurity threat.
Análisis de seguridad de un PLC Beckhoff CX5020 utilizado en sistemas SCADA, revelando vulnerabilidades y demostrando formas de obtener control sobre el programa y el sistema operativo.
Explore mobile network vulnerabilities and learn self-defense strategies using SnoopSnitch, an Android app that detects common attacks like IMSI catchers and SIM exploits.
Explore ECMA Script 6 from a security perspective, covering new language features, potential attack vectors, and strategies to mitigate risks in modern web browsers.
Explore Windows sandboxing challenges, security vulnerabilities, and OS limitations. Learn about unexpected behaviors, bugs in popular applications, and strategies for auditing sandbox implementations.
Explore cable TV network vulnerabilities and attacks, including analog and digital systems, IRD decoders, and management servers. Learn techniques for hijacking set-top boxes and remote shutdown.
Explore tools and techniques for analyzing malicious PDF files, including phoneypdf framework. Learn to leverage Adobe PDF DOM and XFA for deeper insights into PDF exploitation and JavaScript execution.
Explore multi-value WiFi, its security implications, and latest developments in cloud Wi-Fi. Learn to leverage wireless technology as a business driver and protect against threats in enterprise environments.
Explore fuzzing binary protocols with Zulu, a GUI-based tool for easy capture, mutation, and replay. Learn its features and successful bug-finding applications.
Explore SAML protocol security, including XML signature attacks, attribute implementation, and fuzzing techniques. Learn to identify and mitigate vulnerabilities in SSO systems.
Explore advanced smartphone forensics techniques for iOS, Windows Phone, and BlackBerry, focusing on cloud backups, data encryption, and device tracking protocols.
Get personalized course recommendations, track subjects and courses with reminders, and more.