Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into real-world incident response as a Salesforce expert walks through investigating an actual security breach from initial alert to resolution.
Dive into hands-on malware reverse engineering techniques with macOS security expert Chris Lopez in this practical demonstration session.
Discover how to bridge Python and Objective-C for advanced red team operations on macOS systems, combining scripting power with native system access for enhanced penetration testing.
Discover how to restore reflective code loading capabilities on macOS systems through advanced security research and reverse engineering techniques.
Discover iPhone backup forensics fundamentals with security expert Kinga Kieczkowska, covering essential techniques for mobile device investigation and data recovery.
Explore AI's potential limits in cybersecurity detection through cutting-edge research insights and practical applications in threat identification.
Master binary diffing techniques for *OS platforms, focusing on extracting and analyzing IPSW files, comparing binaries, and understanding security patches using open-source tools like ipsw and Ghidra.
Delve into the reconstruction of CVE-2023-41990, exploring TrueType font vulnerabilities in macOS and iOS through detailed analysis of Apple's font rendering system and exploit mechanisms.
Explore innovative techniques for mapping macOS malware in 3D space, enabling better threat detection and family identification through advanced data science methodologies.
Explore advanced techniques for restoring reflective code loading capabilities on macOS, including detection methods, security implications, and defensive strategies for memory-based payload execution.
Explore how Large Language Models enhance macOS security through advanced command line activity analysis, leveraging endpoint telemetry and contextual data for improved threat detection.
Dive into advanced iOS malware detection techniques and explore real-world commercial spyware samples, including NSO's BlastPass exploit and tactics used to evade detection systems.
Dive into macOS bootstrap server and launchd functionality, exploring system service management, XPC, Mach APIs, and security implications for threat detection and system monitoring.
Delve into advanced macOS security strategies, focusing on behavior-based threat detection methods, data collection tools, and real-world applications for identifying sophisticated cyber threats.
Delve into advanced macOS malware analysis techniques, focusing on Mach-O similarity methods, YARA-X implementation, and feature extraction for improved malware detection and analysis.
Get personalized course recommendations, track subjects and courses with reminders, and more.