Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master effective visualization techniques for cybersecurity incidents and threat intelligence, enhancing your ability to communicate complex security concepts through clear, standardized diagrams.
Uncover techniques for finding hidden private keys, certificates, and encryption keys in firmware, with real-world examples from Netgear, Fortinet, and Dell's security vulnerabilities.
Discover how power LED brightness variations in devices can be exploited through video footage to extract cryptographic keys, with demonstrations using smartcard readers and USB speakers.
Explore real-time deepfake technology and its potential security risks through practical demonstrations of CEO impersonation using open-source tools and accessible hardware.
Delve into prototype pollution vulnerabilities in Node.js, exploring how they enable remote code execution, analyzing real-world exploits, and understanding recent security mitigations.
Discover groundbreaking advances in Windows shellcode analysis through SHAREM framework, offering enhanced emulation, complete code coverage, and superior disassembly capabilities for security professionals.
Explore how ANSI escape sequences can be weaponized to compromise log files, and learn essential prevention techniques for securing modern application logging systems and forensic investigations.
Discover physical attack vulnerabilities in Android smartphones, from Recovery mode exploits using SD cards to USB stack weaknesses in secondary bootloaders for achieving root access and code execution.
Dive into advanced RDP attack monitoring techniques and threat actor behaviors through a unique D&D-themed analysis of cybersecurity tradecraft and defensive strategies.
Discover advanced web race-condition attack techniques, from limit-overrun exploits to state machine manipulation, with practical methodologies and tools for identifying and exploiting vulnerabilities.
Dive into the groundbreaking world of AI security testing, exploring red team methodologies, algorithmic bounties, and practical strategies for evaluating Large Language Models beyond basic exploits.
Explore how internet platforms evolve from user-friendly to exploitative, and discover practical solutions including antitrust measures, privacy laws, and user empowerment tools to combat digital degradation.
Dive into a fascinating investigation of Dark Caracal cyber-mercenaries, exploring their operational blunders, victim patterns, and surprising effectiveness despite major security mishaps.
Dive into real-world hacking adventures, from prison systems to major tech companies, exploring identification, exploitation techniques, and potential impact across different organizational contexts.
Delve into the fascinating journey of cryptographers attempting to solve Cicada3301's Liber Primus, exploring collaborative puzzle-solving techniques, community persistence, and cryptographic challenges since 2014.
Get personalized course recommendations, track subjects and courses with reminders, and more.