Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Windows drivers: IRPs, IRQLs, device objects, function handlers, I/O controls, and memory access. Gain practical insights for driver development and debugging.
Explore modern Man-In-The-Middle attack techniques with MITMf, a Python framework combining new and old methods for efficient, extendable, and reliable network security testing.
Explore Black Hat's infrastructure, network challenges, and security measures. Learn about wired and wireless setups, threat modeling, and lessons for building robust conference networks.
Explore Android device security using a diverse cluster, addressing fragmentation challenges and enabling efficient vulnerability research and testing across multiple devices.
Explore GSM network vulnerabilities and attack tools that compromise phone calls, messaging, and web browsing. Learn about GSM architecture, weaknesses, and practical demonstrations of exploits.
Explore vulnerabilities in antivirus software, focusing on discovery and exploitation techniques. Learn about attack surfaces, fuzzing, and specific vulnerabilities in popular AV engines.
Explore x86 architecture for security research: privileges, events, hypervisors, and emerging tech. Gain foundational knowledge to streamline your research setup and focus on key questions.
Explore advanced incident remediation techniques for large network breaches, including mass remediation and outrunning the attacker. Learn from real-world experiences to effectively handle complex security incidents.
Explore security implications of HDMI protocols like CEC and HEC, including potential vulnerabilities and corporate risks. Includes demonstration of CEC security testing tool.
Explore 4G/LTE network security, potential vulnerabilities, and testing methods. Learn about LTE deployments, attack vectors, and strategies for securing these networks.
Explore reverse engineering of .NET smart card operating systems, focusing on code analysis and communication protocols to uncover vulnerabilities and test security measures.
Explore the potential of Twitter data to reveal psychopathic traits in killers. Delve into psychological research, profiling techniques, and the intersection of social media and criminal behavior analysis.
Maximizing home-field advantage in cybersecurity through proactive defense, intelligence gathering, and attacker modeling. Learn to adapt strategies, set traps, and take initiative for effective protection.
Explore vulnerabilities in mobile point-of-sale systems, including MitM attacks, arbitrary code injection, and firmware exploitation. Learn to identify weaknesses and conduct security assessments in payment technologies.
Explore network exploitation using Scratch programming language, extending its capabilities to create exploits and fuzz vulnerable services through custom TCP/IP function blocks.
Get personalized course recommendations, track subjects and courses with reminders, and more.