Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into Windows 11 Kernel Transaction Manager vulnerability research, learning how to identify overlooked security issues and develop effective exploits for these "cookie" vulnerabilities.
Discover how to secure Android Bluetooth through red teaming techniques, exploring vulnerability assessment and defensive strategies for mobile device protection.
Dive into advanced exploitation chain techniques and strategies, building on the foundations of the original "Chainspotting" presentation from 2018.
Discover how to identify and exploit long-standing vulnerabilities in web browsers with insights from Ivan Fratric's OffensiveCon25 presentation.
Dive into kernel streaming vulnerabilities with Angelboy's analysis of frame-by-frame exploitation techniques in this technical security presentation.
Dive into the mechanics of garbage collection in V8 JavaScript engine with Richard Abou Chaaya and John Stephenson's technical exploration at OffensiveCon25.
Discover how offensive security skills can enhance defensive strategies in this keynote by Dino Dai Zovi at OffensiveCon25.
Explore the security vulnerabilities of WebGPU and learn attack techniques targeting browsers in this insightful presentation from OffensiveCon25.
Explore dynamic baseband vulnerability research in mobile networks, uncovering security implications when signals are compromised.
Dive into GPU IOMMU security vulnerabilities with Fish and Ling Hanqin, exploring irregular damage patterns and survival strategies in this technical presentation from OffensiveCon25.
Dive into CoreAudio exploitation techniques through Mach message fuzzing, breaking security barriers in audio systems.
Explore parser differentials in cybersecurity, understanding how varying interpretations of data across systems can create exploitable vulnerabilities.
Dive into VirtualBox escape techniques with Corentin Bayet's analysis of vulnerabilities and exploitation methods for breaking out of virtualized environments.
Dive into the challenges of Android kernel security with Chariton Karamitas as he explores KernelGP and race condition vulnerabilities in this technical presentation.
Discover how to create custom x86 microcode for security research and exploitation through the Entrysign technique, exploring advanced processor manipulation methods.
Get personalized course recommendations, track subjects and courses with reminders, and more.