Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore aviation security vulnerabilities through pen testing research, covering access risks, performance calculations, maintenance mode issues, and potential misunderstandings in the industry.
Explore software supply chain vulnerabilities, focusing on SaaS security. Learn about access control, API restrictions, maturity evaluation, logging, cloud security, and code integrity.
Explore effective third-party risk assessment beyond checklists. Learn to ask insightful questions that reveal an organization's commitment to security and trustworthiness in the software supply chain.
Explore common authentication pitfalls, costs, and phases. Learn about 2FA misconceptions, password security, and new guidelines for robust authentication practices in the digital age.
Explore cloud security vulnerabilities, historical incidents, and protective measures. Learn to identify abandoned subdomains and bypass firewalls in this eye-opening talk on hacker perspectives.
Explore why secure coding remains elusive, examining cultural issues, industry challenges, and potential solutions for integrating security into software development practices.
Explore deepfake technology's impact on cybersecurity, covering threats like fraud and fake content, as well as opportunities in biometrics and network traffic analysis.
Learn strategies for being a pioneering security engineer, covering impact, documentation, data storage, education, automation, and corporate security initiatives.
Explore CAN bus fundamentals and hands-on fuzzing techniques for automotive systems, covering ECUs, attack surfaces, and practical demonstrations using various tools and setups.
Explore badge hacking techniques, including card reader software, reading/writing cards, and security encryption, with practical insights and a Python script demonstration.
Explore VoIP phone vulnerabilities, attack methods, and security recommendations. Learn firmware access, emulation approaches, and exploit development for various VoIP devices.
Explore .NET assembly generation, embedding scripting languages, and advanced techniques for creating versatile payloads in this cybersecurity-focused talk on BYOI (Bring Your Own Interpreter).
Explore innovative approaches to enterprise security, focusing on visibility over control, with insights from Heroku's security transformation and practical lessons for implementation.
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Explore the complexities of global cyber norms, challenges in consensus-building, and potential risks in outsourcing digital governance frameworks.
Get personalized course recommendations, track subjects and courses with reminders, and more.