Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring vulnerabilities in autonomous vehicles: sensors, decision profiles, and potential exploits. Insights into connected vehicle programs and their security implications for future transportation systems.
Explore DYODE, a low-cost DIY data diode for securing Industrial Control Systems. Learn about its development, components, and applications in file transfer, Modbus data, and remote debugging.
Explore innovative hacking techniques using light and sound, from C2 channels and exfiltration to disrupting motion detectors and speech jamming. Learn advantages, disadvantages, and mitigation strategies for these unconventional attacks.
Exploring innovative approaches to monetize vulnerabilities and address product security issues through cybersecurity-backed short positions in financial markets.
Explore effective strategies for building resilience against social engineering threats, drawing insights from behavioral science and real-world applications in high-risk environments.
Explore techniques for evading Microsoft ATA in Active Directory environments, including threat detection bypasses, attack chain modifications, and strategies for maintaining domain dominance.
Explore open-source security orchestration using Adaptive Network Protocol (ANP) for efficient threat response, automated network defense, and improved visibility across multiple systems and clouds.
Explore virtual terminals, POS security, and payment fraud techniques. Learn about transaction vulnerabilities, card exploitation, and merchant-side risks in electronic payment systems.
Explore techniques for extracting sensitive data from browser memory dumps, including passwords and session tokens, with insights on potential solutions and vendor responses.
Explore security through design principles, examining real-world examples and innovative approaches to create safer digital environments and user interactions.
Explore the evolution and challenges of cybersecurity defense through historical analogies, myths, and modern-day realities in this thought-provoking keynote address.
Explore anti-forensics techniques for Windows, Linux, and Android, covering memory analysis, encryption, and hardware implants. Learn to protect digital evidence and understand forensic challenges.
Explore physical security vulnerabilities in doors and padlocks, covering various components, attack methods, and protective measures for enhanced security awareness.
Strategies for building and operating an effective internal adversarial simulation team, covering threat analysis, offensive techniques, and defensive metrics to enhance cybersecurity posture.
Explore threat intelligence creation using Evernote, covering data-driven feeds, task management, and open-source intelligence gathering for effective organizational security strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.