Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring the future of cybersecurity, balancing technology and talent, and addressing challenges in the industry through automation, red teaming, and strategic focus.
Unveiling hidden WiFi communication techniques, exploring covert methods, and analyzing security implications of invisible wireless networks.
Explore mobile network vulnerabilities, SIM card access techniques, and baseband firmware analysis. Learn about "wormholes" in smartphones and their potential for identity theft and unauthorized authentication.
Exploring JavaScript cryptography's vulnerabilities, debunking myths, and analyzing real-world implementations to provide an updated perspective on its security challenges and potential solutions.
Explore Thunderbolt DMA attacks beyond FireWire adapters, discussing novel approaches and potential vulnerabilities in current hardware systems with Thunderbolt ports.
Explore how integrating security, legal, and procurement can enhance software security from the start, reducing vulnerabilities and improving vendor accountability in the development process.
Explore PowerShell attack techniques, forensic artifacts, and investigation methods for detecting and mitigating threats in Windows environments.
Hackers Joe Grand and Zoz share behind-the-scenes insights from their TV show "Prototype This," revealing challenges and innovative solutions in creating unique prototypes under tight constraints.
Explore real-time analysis and visualization techniques for cybersecurity, covering data collection, processing, and reporting using advanced technologies like MongoDB, Redis, and API integration.
Dissecting SAP Diag protocol to uncover vulnerabilities, explore attack vectors, and enhance security in SAP Netweaver systems through novel tools and techniques for protocol analysis and exploitation.
Explore HTML5's new features from an attacker's perspective, uncovering potential security vulnerabilities and innovative attack vectors in modern web browsers.
Comprehensive framework for assessing smartphone security in organizations, covering various attack vectors and providing tools for penetration testing across multiple platforms.
Optimizing threat intelligence with MISP: Learn to curate, contextualize, and automate TI feeds for actionable insights, reducing false positives and enhancing SOC, IR, and malware analysis collaboration.
Explore the Cyber Threat Intelligence Analyst role, its competencies, and how it intersects with other cybersecurity disciplines to enhance collaboration and organizational security posture.
Exposé sur les failles de sécurité des dispositifs de stockage portables "sécurisés" avec chiffrement matériel AES, démontrant leur vulnérabilité malgré les promesses des fabricants.
Get personalized course recommendations, track subjects and courses with reminders, and more.