Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in Google Play Billing API, analyzing real-world examples and demonstrating how attackers can bypass payment processes in popular Android games through reverse engineering.
Explore techniques to bypass Windows 10's Device Guard, including VBA, trusted documents, and alternative execution vectors. Dive into internals of scripting engines and host processes.
Exploring IPv6 security policies and their mismatches with IPv4, revealing real-world implications for dual-stacked sites through a wide-scale evaluation project.
Explore hardware hacking of a Bluetooth smartlock, from circuit board analysis to exploit development, covering electronics basics, reverse engineering, and mobile app vulnerabilities.
Explore Linux Audit daemon with Auditbeat for centralized event monitoring, file integrity checks, and security breach detection using interactive dashboards and log analysis.
Debate on hackers, media, truth, and trust. Explores fact-checking, vulnerability disclosure, fake news, and regaining trust in the digital age. Features expert panel discussion and audience participation.
Explore 802.1x network access control, its vulnerabilities, and bypass techniques. Learn why it's not a perfect solution for critical asset protection and how attackers can exploit it.
Explore IoT security vulnerabilities and research methodologies with insights on ecosystem structures, live demonstrations, and manufacturer collaborations for mitigation strategies.
Explore 5 dangerous web vulnerabilities beyond OWASP Top 10, covering exploits and mitigations for both developers and pentesters to enhance application security.
Explore ransomware's impact on MBR, boot process manipulation, and malicious kernel code execution. Learn to debug MBR and understand native code execution without APIs in this technical deep dive.
Explores Windows named pipes as potential security vulnerabilities, covering enumeration, scanning, sniffing, fuzzing, and exploitation techniques, with insights on mitigation and defense strategies.
Explore methodologies and tools for investigating connected devices in criminal cases, addressing challenges and introducing new resources for digital forensics.
Explore Windows sandbox vulnerabilities in popular applications, evaluating protection mechanisms and uncovering flaws in practical sandboxing techniques.
Gain insider knowledge on network vulnerabilities, learn about CVEs, and discover proactive techniques to protect against cyber threats using free tools and heuristic systems.
Explores security risks of SVG images on the web, covering potential exploits, scripting vulnerabilities, and mitigation strategies for developers and security professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.