Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Cybersecurity
Computer Networking
Introducción a la gestión de proyectos
Internet History, Technology, and Security
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover a critical GCP vulnerability that enables malicious apps to become invisible and unremovable from Google user accounts, exploring OAuth 2.0, exploitation techniques, and security implications.
Explore wireless security vulnerabilities in EV charging systems, focusing on CCS technology, eavesdropping risks, and potential attack vectors through power-line communication signals.
Discover how to execute long-range relay attacks on contactless credentials through ISO 14443A protocol vulnerabilities, including live demonstrations and practical mitigation strategies.
Discover advanced techniques for detecting macOS malware through network monitoring, exploring low-level APIs, private frameworks, and user-mode extensions for comprehensive threat detection.
Uncover critical security vulnerabilities in prepaid Android smartphones through detailed analysis of 32 devices, revealing system-level flaws and privilege escalation risks in pre-loaded software.
Dive into the fascinating world of transportation security vulnerabilities and hacking methodologies with expert insights on protecting critical infrastructure and mobility systems.
Dive into real-world bug bounty hunting experiences, from simple vulnerabilities to complex exploit chains, featuring fascinating discoveries like infinite money glitches and CAPTCHA-based encryption breaks.
Dive into time-based SQL injection techniques through Operation GhostShell, featuring live demos and defense strategies for protecting against sophisticated database vulnerabilities.
Uncover insights into adversarial military philosophy taught in Chinese and Russian academies through an NSA veteran's analysis of cybersecurity strategy and information warfare challenges.
Explore machine learning pipeline vulnerabilities and learn to identify, exploit, and defend against model backdoors through input handling bugs and systematic security approaches.
Discover practical IoT hacking techniques, from selecting beginner-friendly devices to building an affordable toolkit under $100. Learn common vulnerabilities and methods to gain device access using simple tools and tactics.
Discover a sophisticated EDR bypass technique combining IAT Hooking, dynamic SSN resolution, and indirect system calls to redirect Windows subsystem execution flow while remaining undetected by traditional security measures.
Discover essential digital defense strategies for travel, focusing on free tools and OPSEC principles to protect your online presence and personal data while maintaining security awareness.
Dive into a comprehensive simulation of cyberattacks on hydroelectric facilities, exploring both offensive tactics and defensive strategies through a custom-built ICS firing range environment.
Discover how to leverage LLMs for automated BOLA vulnerability detection in APIs and web applications, exploring BOLABuster's innovative approach to identifying critical security risks at scale.
Get personalized course recommendations, track subjects and courses with reminders, and more.