Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for bypassing anti-DDoS measures using older technologies, focusing on UDP data analysis, intelligence gathering, and protocol effectiveness.
Explore SS7 vulnerabilities and Trojan attacks that bypass security measures, focusing on signal messages, numbering plans, and location tracking in mobile networks.
Explore the security vulnerabilities of fax technology, including debugging challenges, attack vectors, and mitigation strategies in this comprehensive analysis.
Explore community orchestration techniques using Cerebrate, a powerful tool for managing and coordinating collaborative efforts in cybersecurity and threat intelligence.
Explore MISP-STIX integration for enhanced threat intelligence sharing, focusing on data conversion and interoperability between MISP and STIX formats.
Explore symbolic execution for vulnerability discovery and reverse engineering. Learn KLEE symbolic virtual machine basics to solve complex challenges in software security.
Discover how to apply bug bounty techniques within your organization for enhanced security. Learn to extract and utilize information from various sources to identify vulnerabilities proactively.
Explore security vulnerabilities in VoLTE and VoWiFi, including sniffing attacks, key extraction, and SIP header injections. Learn about potential risks and mitigation strategies for modern voice communication technologies.
Explore automation attacks plaguing various industries, their detection methodologies, and real-world examples of distributed infrastructure used by attackers to launch and monetize these widely distributed, difficult-to-detect threats.
Exploring challenges in threat intelligence platforms and advocating for event-based approaches. Discusses experiences with various systems and settling on MISP for effective correlation and analysis of cyber threats.
Exploring vulnerabilities in hospital cybersecurity and their impact on patient care. Discusses risks, consequences, and strategies to improve security measures in healthcare settings.
Exploration of France's stance on privacy and cryptography, examining restrictive laws, government positions, and their impact on the European Union's policies.
Explore common failures in infosec, their causes, and lessons learned with reverse engineer Ange Albertini. Gain insights to improve your cybersecurity practices and avoid pitfalls.
Explore ALPC-RPC in Windows, including core structures, API, and vulnerability research. Learn about UAC bypass and Local Privilege Escalation discovered during the investigation.
Explore PyMISP and MISP Objects, unlocking new possibilities for threat intelligence sharing and analysis in cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.