Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master Kubernetes security monitoring and attack simulation techniques for effective threat detection and defense in containerized environments.
Explore critical vehicle security vulnerabilities through UDSonCAN fuzzing techniques, revealing potential safety risks in diagnostic systems and their essential countermeasures for modern electric vehicles.
Uncover critical vulnerabilities in railway signaling systems through an analysis of accessible hardware tools and their potential impact on train operations, with focus on Spanish infrastructure.
Explore cybersecurity challenges and policy considerations in the rapidly expanding EV charging infrastructure, focusing on vulnerability assessment and risk mitigation strategies.
Discover powerful web cache exploitation techniques, including Static Path Deception and Cache Key Confusion, to identify and exploit URL parsing vulnerabilities across major platforms like Azure Cloud and Cloudflare.
Delve into VMware device virtualization security, exploring USB system vulnerabilities, SCSI device emulation, and VMKernel design flaws through real-world bug hunting experiences and discoveries.
Explore the fascinating Antwerp Diamond Heist to understand defense-in-depth security principles through analysis of history's greatest vault breach and its modern cybersecurity implications.
Uncover the alarming journey of lost corporate devices in public markets through data scraping, OCR clusters, reverse engineering, and conversations with underground collectors.
Dive into advanced Android security research exploring Qualcomm Adreno GPU vulnerabilities, exploitation techniques, and kernel-level attacks to achieve root access, with practical mitigation strategies.
Explore critical vulnerabilities in medical devices and hospital networks, examining security challenges, SBOM misconceptions, and strategies for creating more secure healthcare environments.
Uncover shocking vulnerabilities in Norwegian banking systems through real-world examples of identity theft and unauthorized access, revealing critical lessons about paper-based security flaws.
Discover how to identify and exploit Bluetooth vulnerabilities in modern vehicle systems using BlueToolkit, exploring real-world security implications and practical attack vectors in automotive and aviation contexts.
Explore the practical challenges of implementing differential privacy systems, from explaining technical guarantees to non-experts to preventing misuse and integrating with existing security tools.
Dive into a real-world investigation of modem vulnerabilities, ISP security flaws, and the concerning centralization of broadband infrastructure through a personal hacking incident analysis.
Master efficient bug bounty automation techniques to enhance hunting speed, bypass limitations, and maximize earnings through strategic tools and methodologies for finding vulnerabilities first.
Get personalized course recommendations, track subjects and courses with reminders, and more.