Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore hardware security challenges, from supply chain vulnerabilities to chip-level attacks. Learn about emerging threats and best practices for securing technology stacks from silicon to software.
Explore Chrome's open-source Clusterfuzz system for real-time security bug detection, distributed fuzzing techniques, and insights into exploitable crash prevention across platforms.
Explore cold boot attacks on DDR2 and DDR3 RAM, revealing vulnerabilities in data retention after power loss. Learn techniques, results, and mitigation strategies for this cybersecurity threat.
Análisis de seguridad de un PLC Beckhoff CX5020 utilizado en sistemas SCADA, revelando vulnerabilidades y demostrando formas de obtener control sobre el programa y el sistema operativo.
Explore mobile network vulnerabilities and learn self-defense strategies using SnoopSnitch, an Android app that detects common attacks like IMSI catchers and SIM exploits.
Explore ECMA Script 6 from a security perspective, covering new language features, potential attack vectors, and strategies to mitigate risks in modern web browsers.
Explore Windows sandboxing challenges, security vulnerabilities, and OS limitations. Learn about unexpected behaviors, bugs in popular applications, and strategies for auditing sandbox implementations.
Explore cable TV network vulnerabilities and attacks, including analog and digital systems, IRD decoders, and management servers. Learn techniques for hijacking set-top boxes and remote shutdown.
Explore tools and techniques for analyzing malicious PDF files, including phoneypdf framework. Learn to leverage Adobe PDF DOM and XFA for deeper insights into PDF exploitation and JavaScript execution.
Explore multi-value WiFi, its security implications, and latest developments in cloud Wi-Fi. Learn to leverage wireless technology as a business driver and protect against threats in enterprise environments.
Explore fuzzing binary protocols with Zulu, a GUI-based tool for easy capture, mutation, and replay. Learn its features and successful bug-finding applications.
Explore SAML protocol security, including XML signature attacks, attribute implementation, and fuzzing techniques. Learn to identify and mitigate vulnerabilities in SSO systems.
Explore advanced smartphone forensics techniques for iOS, Windows Phone, and BlackBerry, focusing on cloud backups, data encryption, and device tracking protocols.
Explore cloud-based techniques for cracking WPA/WPA2 Personal and Enterprise, leveraging massive compute power to perform large-scale dictionary attacks on wireless networks.
Keynote explores rising security challenges, sophisticated threats, and future risks in the digital economy, emphasizing the need for unified security to protect data and infrastructure.
Get personalized course recommendations, track subjects and courses with reminders, and more.