Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore forging trusts in Active Directory for deception-based defense. Learn techniques to implant decoy objects, trap adversaries, and enhance network security through live demonstrations.
Explore cloud security vulnerabilities, attack tactics, and proactive measures for Azure and AWS. Learn about hunting compromised systems and securing cloud marketplaces.
Insights on creating resilient, high-fidelity threat detections that withstand evasion attempts, with practical examples from real-world attacks and methodologies for effective detection development.
Explore social engineering techniques, their evolution, and practical applications in penetration testing. Learn from real-world examples and scenarios to enhance your security assessment skills.
Exploring vulnerabilities in autonomous vehicles: sensors, decision profiles, and potential exploits. Insights into connected vehicle programs and their security implications for future transportation systems.
Explore innovative hacking techniques using light and sound, from C2 channels and exfiltration to disrupting motion detectors and speech jamming. Learn advantages, disadvantages, and mitigation strategies for these unconventional attacks.
Exploring innovative approaches to monetize vulnerabilities and address product security issues through cybersecurity-backed short positions in financial markets.
Explore effective strategies for building resilience against social engineering threats, drawing insights from behavioral science and real-world applications in high-risk environments.
Explore techniques for evading Microsoft ATA in Active Directory environments, including threat detection bypasses, attack chain modifications, and strategies for maintaining domain dominance.
Explore open-source security orchestration using Adaptive Network Protocol (ANP) for efficient threat response, automated network defense, and improved visibility across multiple systems and clouds.
Explore virtual terminals, POS security, and payment fraud techniques. Learn about transaction vulnerabilities, card exploitation, and merchant-side risks in electronic payment systems.
Explore security through design principles, examining real-world examples and innovative approaches to create safer digital environments and user interactions.
Explore the evolution and challenges of cybersecurity defense through historical analogies, myths, and modern-day realities in this thought-provoking keynote address.
Explore anti-forensics techniques for Windows, Linux, and Android, covering memory analysis, encryption, and hardware implants. Learn to protect digital evidence and understand forensic challenges.
Explore physical security vulnerabilities in doors and padlocks, covering various components, attack methods, and protective measures for enhanced security awareness.
Get personalized course recommendations, track subjects and courses with reminders, and more.