Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Tor onion services: their evolution, security improvements, and critical applications. Learn about the new design's enhanced privacy, scalability, and development status.
Evolving APT reconnaissance techniques using malicious documents and watering hole attacks. Detailed analysis of obfuscation methods, scripting languages, and mitigation strategies for enhanced cybersecurity.
Discover simple yet effective red teaming tricks to enhance assessments, including improved USB key drops, C&C concealment, and social engineering techniques using Outlook.
Exploring the psychological toll of classified knowledge on intelligence professionals, addressing cognitive dissonance, trauma, and coping strategies in high-stakes security work.
Explore BearSSL, an SSL/TLS library optimized for constrained systems. Learn about secure crypto, SSL attacks and defenses, and implementing in small RAM environments.
Explore advanced attack techniques using Microsoft signed binaries and PowerShell to bypass detection, manipulate memory, and achieve persistence in Windows systems.
Explore threat modeling through Star Wars, gaining practical insights for effective offensive and defensive security strategies in software development.
Exploration of targeted cyber attacks against civil society groups, focusing on Tibetan community and Latin American cases. Discusses attacker tactics, victim impacts, and future trends.
Explore techniques to bypass application whitelisting in critical systems, including code execution, protection bypasses, and vulnerabilities in McAfee's application control.
Practical exploration of Android security vulnerabilities, covering user mistakes and system flaws. Includes demonstrations of local and remote attacks, emphasizing potential risks and damages.
Learn cost-effective strategies to prevent security incidents through real-world scenarios, gap analysis, and enterprise protection methods. Gain insights on leveraging incident response lessons for improved security programs.
Explore advanced malware analysis techniques using distributed reverse engineering and machine learning to identify code similarities and extract key characteristics from millions of samples.
Leveraging DevOps principles to streamline malware analysis, automate lab setup, and enhance collaboration among security researchers for more efficient threat detection and response.
Explore CANtact, an open-source tool for automotive network analysis. Learn to view, decode, and manipulate CAN traffic for reverse engineering and security testing of vehicle systems.
Explore the factors that prevented Anonymous from being labeled as cyberterrorists, despite their global political activism and masked identity. Gain insights into the complex dynamics of digital activism and cybersecurity rhetoric.
Get personalized course recommendations, track subjects and courses with reminders, and more.