Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into Windows 11 Kernel Transaction Manager vulnerability research, learning how to identify overlooked security issues and develop effective exploits for these "cookie" vulnerabilities.
Discover how to secure Android Bluetooth through red teaming techniques, exploring vulnerability assessment and defensive strategies for mobile device protection.
Dive into advanced exploitation chain techniques and strategies, building on the foundations of the original "Chainspotting" presentation from 2018.
Discover how to identify and exploit long-standing vulnerabilities in web browsers with insights from Ivan Fratric's OffensiveCon25 presentation.
Dive into kernel streaming vulnerabilities with Angelboy's analysis of frame-by-frame exploitation techniques in this technical security presentation.
Dive into the mechanics of garbage collection in V8 JavaScript engine with Richard Abou Chaaya and John Stephenson's technical exploration at OffensiveCon25.
Discover how offensive security skills can enhance defensive strategies in this keynote by Dino Dai Zovi at OffensiveCon25.
Explore the security vulnerabilities of WebGPU and learn attack techniques targeting browsers in this insightful presentation from OffensiveCon25.
Explore dynamic baseband vulnerability research in mobile networks, uncovering security implications when signals are compromised.
Dive into GPU IOMMU security vulnerabilities with Fish and Ling Hanqin, exploring irregular damage patterns and survival strategies in this technical presentation from OffensiveCon25.
Dive into CoreAudio exploitation techniques through Mach message fuzzing, breaking security barriers in audio systems.
Explore parser differentials in cybersecurity, understanding how varying interpretations of data across systems can create exploitable vulnerabilities.
Dive into VirtualBox escape techniques with Corentin Bayet's analysis of vulnerabilities and exploitation methods for breaking out of virtualized environments.
Dive into the challenges of Android kernel security with Chariton Karamitas as he explores KernelGP and race condition vulnerabilities in this technical presentation.
Discover how to create custom x86 microcode for security research and exploitation through the Entrysign technique, exploring advanced processor manipulation methods.
Get personalized course recommendations, track subjects and courses with reminders, and more.