Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Develop specialized skills for reverse-engineering Go binaries, focusing on offensive security tooling. Learn methodologies and disassembler plugins to tackle this challenging language.
Hands-on deep-dive into Azure AD's OAuth implementation, covering JWT, token types, and attack scenarios. Learn to secure environments and detect token abuse.
Essential insights for effective incident response, covering crucial aspects often overlooked by beginners. Learn from real-world experiences to enhance your preparedness and decision-making during critical cybersecurity events.
Explore nation-state techniques for breaching air-gapped networks, analyzing similarities across frameworks and providing practical advice to enhance security and detect potential attacks.
Hands-on workshop exploring real-world cryptographic vulnerabilities. Implement attacks using provided tools, gaining practical experience in identifying and understanding common cryptographic weaknesses.
Explore diverse malware implementations within techniques, analyze tool differences, and learn to build resilient detection rules by modeling procedures and evaluating similarities.
Explore advanced CMD obfuscation techniques used by threat actors, including string manipulation and encoding methods. Learn to create and detect complex obfuscated payloads using the Invoke-DOSfuscation framework.
Explore machine learning for malware categorization using Python and scikit-learn. Learn to transform data, apply clustering algorithms, and generate YARA rules for effective malware hunting.
Explore symbolic execution for Ethereum smart contract analysis, addressing technical challenges and introducing Manticore, an open-source tool for enhancing contract security audits.
Exploring major supply chain attacks of 2017, including MeDoc and CCleaner compromises. Analyzes attacker methods, malware used, and impact on victims. Discusses the history and future of supply chain attacks.
Explore container technologies, their evolution, security features, and management tools. Compare application and system containers, and learn to choose the right container for your needs.
Explore DNS Rebinding attacks, their resurgence, and tools for network reconnaissance from inside browsers. Learn about a "localhost census" page that enumerates HTTP services on visitors' computers.
Explore famous smart contract vulnerabilities, including the DAO hack and Parity wallet issues. Learn Ethereum's quirks and general principles of smart contract security.
Explore security vulnerabilities in Electron framework, focusing on XSS risks in desktop applications. Learn about attack vectors, CVEs, and see live demos of exploiting vulnerable Electron apps.
Unraveling a large-scale botnet conducting social media fraud through honeypots and HTTPS man-in-the-middle attacks. Explores technical details, methodology, and market dynamics behind social media fraud.
Get personalized course recommendations, track subjects and courses with reminders, and more.