Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies to combat rising cybercrime in sub-Saharan Africa, addressing unique challenges and developing tailored solutions for emerging industries in the region.
Explore cybersecurity threats to space systems, motivations behind attacks, and essential perspectives for securing these critical infrastructures.
Explore Apple's Wi-Fi kernel extensions, uncovering new vulnerabilities and attack surfaces in the ever-evolving landscape of iOS security. Gain insights into the ongoing cat-and-mouse game of bug fixes and emerging threats.
Explores security risks and policy challenges of implanted medical devices in secure spaces, discussing mitigations and workforce protections for national security.
Explore vulnerabilities in Diameter-based networks, including tracking subscribers, billing fraud, and denial of service attacks. Learn about security risks and recommendations for next-generation roaming networks.
Exploring PTSD's impact on cybersecurity professionals, offering insights for understanding and supporting affected individuals in the field.
Innovative approach to cybersecurity education for teenagers, leveraging government, industry, and community support to create the next generation of experts and inventors in Israel.
Upgrade your security approach with collaboration, innovation, and risk-based technology. Learn to adapt to business needs, find the right solutions, and move beyond traditional "no" responses.
Explore automotive diagnostic protocols, their applications in research and repair, and learn about open-source tools for interacting with vehicle systems.
Explore emerging drone threats to industrial wireless systems, electronic warfare concepts, and defensive strategies for protecting critical infrastructure from cyber-physical attacks.
Explore security vulnerabilities in autonomous vehicles and privacy risks in connected cars. Learn about sensor attacks, tracking methods, and potential countermeasures for safer automotive technologies.
Explore vulnerabilities in industrial Ethernet switches, their impact on critical infrastructure, and learn mitigation strategies. Gain insights into attacking management planes and creating malicious firmware for MITM attacks.
Discover a technique to conceal malicious payloads in Android packages, manipulating encrypted data to appear as genuine images while evading detection and reverse engineering attempts.
Comprehensive analysis of remote automotive attack surfaces across various manufacturers, exploring vulnerabilities and potential security improvements in modern vehicles.
Automated iOS app security assessment tool SIRA demonstrated, revealing common flaws in AppStore products. Explores risks, testing methods, and future improvements for mobile app security.
Get personalized course recommendations, track subjects and courses with reminders, and more.