Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore attack and defense toolkits in high and low frequency environments, gaining insights into cybersecurity strategies and techniques used in various network scenarios.
Explore techniques for exploiting vulnerabilities in paravirtualized devices, focusing on Xen hypervisor security and potential attack vectors in virtualized environments.
Learn to create a secure travel laptop for sensitive data protection, exploring hardware choices, OS configurations, and best practices for digital safety while on the go.
Explore techniques for attacking and defending LoRa systems, a long-range wireless technology, in this comprehensive security analysis presentation from SyScan360.
Explore Windows systems and code signing protection techniques, focusing on security vulnerabilities and mitigation strategies for software developers and cybersecurity professionals.
Explore advanced techniques for exploiting vulnerabilities in Adobe Reader, focusing on security flaws and potential attack vectors in this popular PDF software.
Explore practical techniques for bypassing Supervisor Mode Execution Prevention (SMEP) in system security, enhancing your understanding of kernel exploitation and protection mechanisms.
Explore advanced exploitation techniques targeting Hyper-V's inter-process communication, moving from kernel-level to hypervisor-level vulnerabilities in virtualized environments.
Explore vulnerabilities in SS7 protocols and potential attacks on telecom operators and mobile subscribers, uncovering risks in mobile network security.
Explore advanced techniques for developing a full IE11 exploit, navigating modern security measures and mitigation strategies.
Explore advanced techniques for analyzing and exploiting core system vulnerabilities in this in-depth security presentation from SyScan'15 Singapore.
Explore vulnerabilities in NFC payment cards, including techniques for cloning and exploiting weaknesses in contactless payment systems.
Explore cryptographic backdooring techniques and their implications for security systems in this insightful conference talk from SyScan'15 Singapore.
Explore advanced black box fuzzing techniques inspired by Singapore's iconic Merlion, enhancing software security testing skills and uncovering hidden vulnerabilities.
Explore innovative hacking techniques using steganography to hide exploits within images, blending cybersecurity with digital art for covert attacks and data exfiltration.
Get personalized course recommendations, track subjects and courses with reminders, and more.