Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into groundbreaking research on Intel CPU microcode manipulation, exploring techniques for persistent modifications and potential security implications through microcode backdoors in x86 instruction sets.
Delve into the forensic analysis and defense strategies of the 2022 KA-SAT network cyberattack, exploring malware deployment tactics, network-based attacks, and rapid incident response techniques used to protect satellite communications.
Explore critical privacy and security challenges in augmented reality technology, focusing on mobile device vulnerabilities and protective measures for AR applications.
Delve into NSPredicate exploitation techniques on Apple devices, exploring security vulnerabilities, bypass methods, and practical demonstrations for executing arbitrary code in privileged iOS processes.
Explore current legislative threats to encryption, focusing on Senate proposals, FBI initiatives, and global efforts to undermine secure messaging under the pretext of fighting exploitation.
Master efficient OSINT techniques for physical security, focusing on rapid intelligence gathering, predictive analysis, and actionable insights for critical situation assessment and risk management.
Discover innovative post-exploitation techniques for proxying Windows authentication protocols remotely, enabling user impersonation and domain control without elevated privileges.
Discover how to intercept and analyze HL7 medical device communications using HL7Magic, a new security testing tool designed to identify vulnerabilities in healthcare data transmission systems.
Explore software liability policies and their impact on cybersecurity through interactive legal exercises, focusing on Biden-Harris Strategy's Pillar 3 and future regulatory implications.
Delve into advanced MacOS security exploitation, exploring System Integrity Protection bypass techniques, undeletable malware creation, and essential detection strategies for security teams.
Discover how cyberpsychology and AI can empower defenders to exploit human vulnerabilities in cyber attacks, turning defense into an offensive advantage through psychological tactics.
Delve into data center power management security, exploring vulnerabilities in PDUs and DCIM systems while learning critical infrastructure protection strategies and attack vectors.
Dive into an auto security researcher's investigation of modern car theft techniques, focusing on CAN bus exploitation, vehicle security vulnerabilities, and potential protective measures.
Explore security vulnerabilities in smart vacuum robots and learn practical techniques to protect your privacy while maintaining control over these AI-enabled devices.
Explore frequency hopping techniques for protecting DIY drones against RF attacks, including implementation challenges and effective security strategies for consumer drone systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.