Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore deep learning applications in cybersecurity, including use cases, data pipelines, algorithms, and real-world deployment challenges. Learn how AI can combat ransomware and other cyber threats.
Exploración detallada de la explotación del heap XNU, analizando dos vulnerabilidades del kernel y tres exploits. Cubre internos de XNU, técnicas de explotación y cambios entre versiones de iOS.
Exploring checkm8 vulnerability in iOS SecureROM, its exploitation for jailbreaking, and updates on pongoOS development. Insights into cross-platform challenges and future plans for iOS security research.
Explore vulnerabilities in Ruckus AP devices, including pre-authentication remote code execution exploits. Learn about research methods, discovered CVEs, and a framework for cross-architecture analysis.
Explore ML techniques to detect and prevent authorization bypass vulnerabilities in web applications, focusing on successful attacks and minimizing false positives.
Explore bug bounty programs' challenges and realities from multiple perspectives, offering insights into their evolution, limitations, and potential for improvement in cybersecurity.
Learn essential digital security techniques for analyzing data and information, focusing on threat identification, communication safety, and practical tools for journalists and civil society groups.
Explore CTF competitions: learn security through challenges in web, crypto, reverse engineering, and more. Gain insights on dos and don'ts for successful participation in HackIM CTF.
Explore advanced techniques for detecting malicious patterns in event streams using behavioral indicators and machine learning, focusing on early detection and automated pattern discovery.
Comprehensive overview of STIX/TAXII 2 standards for Cyber Threat Intelligence, covering key concepts, data models, and interoperability challenges in threat intelligence sharing.
Discover how to leverage bug bounty programs to kickstart a career in cybersecurity and become a competitive candidate for top tech companies in Silicon Valley.
Explore OWASP ASVS 4.0 updates, new controls, and industry applications. Learn about modern web app security, architecture changes, and a novel attack technique.
Explore side-channel attacks and machine learning in cybersecurity with expert Stjepan Picek. Learn practical techniques, profiling methods, and key outcomes in this informative webinar.
Explore techniques for detecting vulnerabilities in Android kernel drivers using static analysis and fuzzing, with focus on DR.CHECKER and DIFUZE tools.
Explore IMSI catcher detection techniques, evaluate Android apps' effectiveness, and learn about White-Stingray tool for bypassing detectors. Discover vulnerabilities and best practices for mobile security.
Get personalized course recommendations, track subjects and courses with reminders, and more.