Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into the technical analysis of QuaDream's zero-click iOS spyware, exploring exploit mechanisms, payload characteristics, and real-world implications for mobile security through expert reverse engineering insights.
Delve into a critical security vulnerability in Apple's Shortcuts app that enables arbitrary command execution and file access across iOS, WatchOS, MacOS, and VisionOS, potentially facilitating drive-by-download attacks.
Discover the fundamentals of iPhone backup forensics, exploring data acquisition methods, artifact analysis, and automated processing techniques using SQL queries and Python scripts.
Delve into Apple's Rapid Security Response system, exploring its architecture, limitations, and real-world deployment patterns in iOS 16 and macOS 13, with insights from security research.
Discover how iOS sysdiagnose timestamps can reveal user movements, travel patterns, and geographical locations - essential knowledge for mobile forensics investigations and security analysis.
Dive into Swift code reversing techniques, focusing on disassembly analysis of strings, arrays, and closures, with practical examples from recent macOS malware implementations.
Dive into real-world incident response as a Salesforce expert walks through investigating an actual security breach from initial alert to resolution.
Dive into hands-on malware reverse engineering techniques with macOS security expert Chris Lopez in this practical demonstration session.
Discover how to bridge Python and Objective-C for advanced red team operations on macOS systems, combining scripting power with native system access for enhanced penetration testing.
Discover how to restore reflective code loading capabilities on macOS systems through advanced security research and reverse engineering techniques.
Discover iPhone backup forensics fundamentals with security expert Kinga Kieczkowska, covering essential techniques for mobile device investigation and data recovery.
Explore AI's potential limits in cybersecurity detection through cutting-edge research insights and practical applications in threat identification.
Master essential public speaking techniques and overcome presentation anxiety with expert guidance from seasoned speakers in this practical mentoring session.
Master essential public speaking techniques and overcome presentation anxiety with expert guidance from Patrick Wardle in this comprehensive mentoring session.
Master essential public speaking techniques and overcome presentation anxiety with practical tips from expert speaker Jaron Bradley in this focused mentoring session.
Get personalized course recommendations, track subjects and courses with reminders, and more.