Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the intersection of AI and exploit development in this keynote examining how automation impacts security professionals and the future of the field.
Dive into the unexpected discovery of an Android kernel exploit in the wild, exploring real-world vulnerabilities and exploitation techniques.
Explore UEFI exploit development using cross-architecture UEFI quines as a framework, enhancing your understanding of low-level system vulnerabilities.
Explore advanced techniques for bypassing WebP image format security measures, uncovering vulnerabilities and potential exploits in web applications.
Explore V8 engine's heap sandbox implementation, its security implications, and potential vulnerabilities in Chrome's JavaScript engine.
Explore techniques for attacking Windows device drivers and potential sandbox escape methods in this advanced security analysis presentation.
Explore microcontroller security in Meta's smart glasses, focusing on defense strategies through offensive techniques and real-world applications.
Explore Webkit IPC vulnerabilities and techniques for escaping the Safari sandbox, gaining insights into browser security and exploitation.
Explore Apple's USB-C controller vulnerabilities and hacking techniques with expert Thomas Roth in this cutting-edge cybersecurity presentation.
Entdecken Sie Techniken zur Ausnutzung von Android Binder-Schwachstellen für Root-Zugriff durch Fuzzing-Methoden und Sicherheitsanalyse.
Explore Samsung Galaxy A* boot chain vulnerabilities and attack techniques for enhanced mobile security understanding.
Explore Microsoft Exchange PowerShell Remoting vulnerabilities and exploitation techniques for enhanced cybersecurity awareness and defense strategies.
Explore techniques for blindly exploiting load-balanced services in "The Mines of Kakadûm" presentation, uncovering vulnerabilities in distributed systems.
Dissect Secure Boot's third-party attack surface, exploring vulnerabilities and potential exploits in boot processes.
Explore advanced Android security, focusing on Memory Tagging Extension (MTE) and OEM-specific implementations. Gain insights into exploiting vulnerabilities in custom logic.
Get personalized course recommendations, track subjects and courses with reminders, and more.