Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Artificial Intelligence
Web Development
Data Analysis
Terrorism and Counterterrorism: Comparing Theory and Practice
The Science of Happiness
Vital Signs: Understanding What the Body Is Telling Us
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the world of cryptography with NorthSec's workshop. Learn about encryption, cyphers, hashes, and how to break them in a 3-4 hour live stream.
Learn about the security implications of Unicode character transformations, including normalization and capitalization, in this less than 1-hour talk by Philippe Arteau from NorthSec.
Explore the use of types in compilers and interpreters for software hardening measures with NorthSec. Learn to apply policies across address spaces and protect against memory vulnerabilities. Less than 1 hour.
Explore Direct Memory Access (DMA) attacks and Input Output Memory Management Unit (IOMMU) functioning in this less than 1-hour material by NorthSec. Learn about IOMMU integration within major operating systems and DMA attack strategies.
Explore the security implications of fingerprint cloning with 3D printers in this under 1-hour presentation by NorthSec. Learn about real-world attack scenarios and the sophistication needed to execute them.
Explore quantum-safe cryptography with Christian Paquin from Microsoft Research. Learn about its development, standardization, implementation, and integration in TLS, SSH, and VPN in under 1 hour.
Learn about multi-architecture disassembling in less than an hour with Joan Calvet, a developer and reverse-engineer, in this NorthSec offering.
Learn practical uses of program analysis, including Instrumentation, Symbolic and Concolic Execution, from NorthSec. Understand how to automatically generate exploits against complex applications in under an hour.
Explore the art of cache timing covert channels on x86 multi-core with NorthSec. Learn techniques, challenges, and countermeasures in less than an hour.
Explore the history of privacy legislation in the U.S. and Canada, understand government surveillance practices, and delve into the principles that check surveillance in this less than 1-hour material from NorthSec.
Explore the science and technology behind the chaotic encryption key system (CHEKS) with NorthSec. Learn its concept, properties, and see a basic chat application demo.
Learn about threat modeling in the gaming industry with NorthSec. Understand client-side logic, network protocols, and user account management in under an hour.
Explore the challenges of reversing object-oriented code in modern malware with NorthSec's under 1-hour material. Learn various approaches and tools for code reconstruction.
Learn to hack your car's Controller Area Network (CAN) bus with an open-source toolkit in this less than 1-hour talk by NorthSec.
Learn about post-quantum cryptography from Philippe Lamontagne, a Ph.D. holder and research officer at Canada's National Research Council, in under an hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.