Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore common authentication and authorization pitfalls in Rails applications, and learn about a new dynamic analysis tool for security researchers and developers.
Explore DDoS attack tools, methods, and motivations. Gain insights into attacker patterns and progression for better protection against cyber threats.
Explore Lotus Notes/Domino security vulnerabilities and learn effective penetration testing techniques for web servers, native servers, and client-side exploits.
Discover simple techniques for bug hunting on AIX and IBM products, building on "Breaking The Links" methodology and exploring new vulnerabilities.
Explore advanced machine learning for network-level DGA detection and the latest crimeware evasion techniques. Learn about botnet elements, forensics, and new detection technologies.
Explore vulnerabilities in payment terminals, including memory corruption and code execution risks. Learn about attack surfaces, research approaches, and potential payloads in chip-and-pin systems.
Learn to create an efficient, automated environment for analyzing suspected malicious sites and software, even with limited time and budget.
Explore modern social engineering tactics and tools used by cybercriminals, with live demonstrations and practical defense strategies for individuals and organizations.
Exploring the neglected aspect of data integrity in information security, its importance for business decisions, and practical solutions for ensuring data accuracy.
Discover how to build resilient enterprise security by actively testing defenses, validating controls, and learning from simulated scenarios to prepare for real-world threats and challenges.
Demystifying post-quantum cryptography: Learn about five families of crypto systems resistant to quantum computing, explained through simple analogies and everyday objects like Rubik's Cubes and braids.
Reversing and hijacking a remote-controlled Nerf tank gun through hardware, firmware, and RF analysis. Includes live demonstration of taking control and potentially shooting the conference organizer.
Exploring the shift from viewing cybersecurity as risk to security debt, challenging traditional paradigms and proposing a new approach to articulate and measure software security benefits.
Explore Snuffleupagus, a new PHP security module for killing bug classes and virtual-patching vulnerabilities without modifying application code. Learn its features and implementation.
Explore novel techniques for bypassing 802.1x-2010 and MacSEC, discussing weaknesses in EAP and demonstrating improved methods for network penetration using the open-source tool Silent Bridge.
Get personalized course recommendations, track subjects and courses with reminders, and more.