Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore DNS encryption's impact on internet privacy, security, and network operations. Delve into DoT and DoH standards, their implications for users and providers, and the shift towards centralized DNS.
Comprehensive exploit chain analysis for remotely rooting modern Android devices, focusing on Pixel phones. Explores attack surfaces, introduces new vulnerabilities, and demonstrates practical exploitation techniques.
Explore Tesla's Battery Management System reverse engineering, focusing on power upgrades in performance models. Learn about architecture, data structures, and hardware modifications for enhanced vehicle performance.
Explore techniques to exploit vulnerabilities in AI-powered game bots, focusing on StarCraft. Learn about deep reinforcement learning, adversarial attacks, and potential defenses in gaming AI.
Explore vulnerabilities in Windows 10's SecureKernel, potentially compromising Virtualization-Based Security. Learn exploitation techniques and the process of finding and fixing critical security flaws.
Explore real-world attacks on ML systems, from recommendation engines to email filters, and learn practical defense strategies against adversarial machine learning threats.
Demystifying Windows access token manipulation attacks and providing effective detection strategies for defensive practitioners in enterprise environments.
Discover data-driven techniques to effectively reduce human risk in cybersecurity, challenging traditional training approaches and focusing on behavioral change strategies.
Explore Bluetooth Low Energy vulnerabilities through firmware reverse engineering, uncovering remote code execution exploits at the protocol's lowest levels without authentication or pairing.
Explore the US government's efforts to secure elections, including intelligence sharing, cybersecurity services, and collaboration with state and local officials to protect against malicious activities.
Explore the privacy and security risks of educational technology implementation in schools, highlighting concerns and potential actions for improvement.
Análisis de datos sobre el uso de bibliotecas de código abierto en aplicaciones, examinando vulnerabilidades, dependencias y patrones de actualización para mejorar la seguridad del software.
Explore the evolution of Black Hat's network operations, including equipment choices, regional adaptations, and cybersecurity insights from global events. Gain insider knowledge on network deployment and attendee behavior trends.
Explore generic methods to bypass StructureID Randomization, gaining arbitrary Read/Write ability without relying on JIT compiler-related techniques. Learn innovative approaches to inspire better security mitigations.
Unveiling a new speculative execution attack exploiting SWAPGS instruction, bypassing existing CPU and kernel protections. Explores side-channel vulnerabilities and their implications for system security.
Get personalized course recommendations, track subjects and courses with reminders, and more.