Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover practical strategies to detect and defend against digital deception across network layers, from electromagnetic spoofing to false narratives, while developing critical skills to discern truth in our interconnected world.
Explore how CCTV camera blind spots create security vulnerabilities through location-based confidence weakness, and learn about TipToe - a novel evasion attack demonstrating detection flaws across various conditions.
Discover WHAD, a versatile framework for wireless protocol hacking that enables hardware interoperability and simplified tool development for security researchers exploring wireless vulnerabilities.
Uncover critical security vulnerabilities in Wi-Fi cameras and baby monitors, exploring attack surfaces, privacy issues, and zero-day exploits while learning practical remediation strategies for IoT devices.
Discover critical security vulnerabilities in CI/CD pipelines through a case study of Bazel GitHub Action, learning practical strategies to protect your projects from command injection attacks.
Explore the fascinating intersection of WiFi scanning and aviation as two researchers conduct aerial wireless network detection experiments using a Cessna, revealing surprising insights about signal ranges and detection capabilities.
Dive into advanced LDAP query obfuscation techniques and defense strategies, exploring a comprehensive framework for detecting and preventing directory services attacks through custom tokenization and parsing.
Dive into real-world attack vectors and strategies for industrial networks through a decade of Red Team exercises, focusing on operational technology and control system vulnerabilities.
Discover how to implement EPSS for vulnerability management, leveraging data-driven insights to predict and prioritize exploit risks in CI/CD pipelines and system patching processes.
Gain insights into real-world challenges and practical strategies for developing secure LLM applications, exploring vulnerabilities, defense mechanisms, and best practices for robust AI systems.
Uncover how a single domain purchase can exploit WPAD vulnerabilities, leading to massive-scale man-in-the-middle attacks and compromising hundreds of thousands of internet clients through DNS manipulation.
Explore TLS certificate validation vulnerabilities and their automated exploitation using certmitm, featuring real-world attacks on iOS and Windows 11 systems.
Explore how security researchers scraped r/defcon subreddit data to create an online version of the Wall of Sheep, revealing insights about information leakage in the security community.
Delve into the mysterious world of ethernet protocols, exploring obscure ethertypes across industrial, medical, and transportation networks, with practical demonstrations and security implications.
Uncover critical vulnerabilities in OSDP security protocols and learn practical exploitation techniques for bypassing encrypted RFID systems through demonstrated pentesting tools and methodologies.
Get personalized course recommendations, track subjects and courses with reminders, and more.