Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Communication Skills
Project Management
Language Learning
FinTech Ethics and Risks
Mining Massive Datasets
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn techniques for applying cyber threat intelligence and hunting adversaries in digital environments with expert John Bambenek.
Explore the open-source ARM-X CPU architecture emulator, learning its features and applications for security research and embedded systems development.
Comprehensive exploration of speculative execution attacks, from original Spectre to new vulnerabilities. Clear explanations of exploitation challenges and processor vulnerabilities, with insights on high-resolution timers as potential weapons.
Explore the future of application security with David Brumley's insightful keynote, discussing AI's role and potential impact on human involvement in AppSec.
Explore the future of application security and its potential shift towards automation in this thought-provoking keynote by David Brumley of Forallsecure at CanSecWest 2022.
Explore cutting-edge cybersecurity insights and innovations from industry experts at this premier conference, focusing on artificial intelligence's role in advancing security measures.
Explore techniques for evading Falco detection in Kubernetes clusters, learning how to compromise systems without alerting security operations centers.
Explore cutting-edge cybersecurity insights and innovations from industry experts at the premier CanSecWest conference, featuring talks on emerging threats and defensive strategies.
指紋認証システムのハッキング手法を解説。古典的な研究でありながら、現代にも通用する貴重な情報を提供。セキュリティ専門家向けの高度な内容を日本語で解説。
Explore vulnerabilities in fingerprint recognition systems and learn techniques to bypass biometric security measures in this classic presentation from PACSEC 2006.
Early RFID security research by Adam Laurie, exploring vulnerabilities in RFID passports and predicting the need for RFID-blocking wallets. A pioneering look at RFID technology's security implications.
Explore automated security analysis techniques for IoT firmware, uncovering vulnerabilities and potential threats in connected devices at scale.
Explore the potential risks of AI voice technology abuse and learn about cutting-edge research in algorithm-based attacks, with insights from Tencent researchers.
Explore modern disinformation tactics and their impact on security operations centers, with insights on analyzing and countering these threats in today's complex information landscape.
Insightful interview with Project Zero's Natalie Silvanovich, exploring her expertise in exploit research and cybersecurity. Gain valuable insights into vulnerability discovery and cutting-edge security practices.
Get personalized course recommendations, track subjects and courses with reminders, and more.