Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn techniques for applying cyber threat intelligence and hunting adversaries in digital environments with expert John Bambenek.
Insightful interview with Project Zero's Natalie Silvanovich, exploring her expertise in exploit research and cybersecurity. Gain valuable insights into vulnerability discovery and cutting-edge security practices.
Renowned security researcher Thomas Dullien explores notable exploits, offering insights into vulnerability analysis and exploitation techniques in this engaging presentation.
Renowned security researcher Thomas Dullien explores notable exploits in this insightful talk, offering valuable insights for cybersecurity professionals and enthusiasts.
Exploit Hall of Fame series featuring James Forshaw, exploring notable exploits. Includes a tour of secwestnet's virtual space for upcoming PACSEC Lightning Talks.
Explore cutting-edge cybersecurity challenges at PWN2OWN Austin 2021, featuring hacking competitions for phones, printers, NAS devices, and routers with over $500,000 in prizes.
Explore cutting-edge hacking techniques targeting phones, printers, NAS, and more at PWN2OWN Austin 2021. Witness live demonstrations of exploits on 22 devices with $500,000+ in prizes.
Live coverage of Pwn2Own Austin 2021, showcasing hacking attempts on phones, printers, NAS devices, and routers. Witness cybersecurity experts compete for over $500,000 in prizes.
Explore advanced web attack techniques focusing on exploiting race conditions, enhancing your penetration testing and bug hunting skills for full-stack exploitation.
Learn advanced token hijacking techniques using PDF files in this expert-level web security tutorial, enhancing your penetration testing and bug hunting skills.
Explore strategy, leadership, and modern conflict through the lens of science fiction with expert authors and military leaders in this thought-provoking discussion.
Explore the security vulnerabilities in Tesla vehicles through a drone-based attack demonstration, highlighting potential risks and countermeasures in automotive cybersecurity.
Explore deepfake technology's impact, current state, and initiatives to combat misinformation, including the Content Authenticity Initiative and hardware-level solutions for trusted content creation.
Explore the open-source ARM-X CPU architecture emulator, learning its features and applications for security research and embedded systems development.
Comprehensive exploration of speculative execution attacks, from original Spectre to new vulnerabilities. Clear explanations of exploitation challenges and processor vulnerabilities, with insights on high-resolution timers as potential weapons.
Get personalized course recommendations, track subjects and courses with reminders, and more.