Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore SmartNIC-based data center security, featuring improved isolation, offload capabilities, and policy scaling. Learn about innovative host introspection techniques for enhanced threat detection and workload integrity.
Explore hacking techniques for machine learning systems in speech, text, and facial recognition, including exploits, backdoors, and adversarial attacks. Live demo included.
Explore ephemeral vulnerabilities in bug bounties, their impact, and how to identify and exploit them. Learn from real-world examples and strategies for continuous security assessment.
Comprehensive workshop on ARM assembly and shellcode creation, covering basics, execve() shell, and reverse shell. Includes hands-on practice with QEMU emulator and Raspberry Pi hardware.
Explore Java's Remote Method Invocation security vulnerabilities, enumeration techniques, and exploitation tools with BaRMIe. Learn about common mistakes and potential solutions in RMI implementations.
Explore Subgraph OS: a hardened Linux desktop with advanced security features, including kernel protection, application sandboxing, and network safeguards.
Explore Cisco ASA internals, reverse engineering techniques, and custom tools for exploit development. Gain insights into vulnerability analysis and mitigation strategies for network security professionals.
Explore techniques for attacking Microsoft Advanced Threat Analytics, including alert suppression, identity exemption, and remote control. Learn about ATA's vulnerabilities and defensive strategies.
Explore HiTag2 RFID encryption vulnerabilities and learn to implement attacks for cloning secure building access tags, based on academic research and practical demonstrations.
Explore motherboard intricacies, security features, and hidden functionalities. Uncover potential exploits, design pitfalls, and challenges in hardware security through chipset analysis and datasheet discoveries.
Explore the cryptanalysis of the Enigma machine, its historical significance, and the techniques used to break its code during World War II.
Critique of penetration testing practices, exploring limitations, misconceptions, and potential harm in cybersecurity. Proposes alternative approaches and challenges industry norms.
Explore USB flash drive forensics, covering hardware, software, file systems, and forensic techniques. Learn about write blockers, Windows registry analysis, and open-source tools for digital investigations.
Explore SAP system vulnerabilities, compression algorithms, and attack techniques. Learn about authentication bypass, validation issues, and practical demonstrations for enhanced security awareness.
Explore software supply chain vulnerabilities, focusing on SaaS security. Learn about access control, API restrictions, maturity evaluation, logging, cloud security, and code integrity.
Get personalized course recommendations, track subjects and courses with reminders, and more.