Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn essential hardware hacking techniques focusing on Serial and JTAG interfaces. Explore embedded devices, TTL signaling, and tools like OpenOCD for effective device communication and manipulation.
Explore the hidden risks of shadow IT, IoT, and mobile workforce in cybersecurity. Learn strategies for regaining control and mitigating threats in the modern digital landscape.
Explore conflict resolution styles in InfoSec and Risk Management through original research, focusing on improving social skills and effective negotiation techniques for better outcomes.
Explore evolving attacker strategies and game-changing defense techniques in cybersecurity. Learn about manual intervention, deconstruction, and layered approaches to stay ahead of threats.
Explore medical device cybersecurity with experts, covering FDA regulations, premarket reviews, and future developments in this informative talk on patient safety and healthcare technology.
Discover a young hacker's journey, exploring vulnerable platforms, wargames, and online challenges. Learn practical tips and guidelines for aspiring cybersecurity enthusiasts.
Explore YubiKey's versatile 2-factor authentication capabilities, from setup to advanced security features. Learn implementation techniques for various projects and understand potential vulnerabilities.
Explore the legal implications of border searches on electronic devices, focusing on the Fourth Amendment, privacy concerns, and practical tips for protecting personal data during travel.
Explore advanced spectrum monitoring techniques using Software Defined Radio, covering transient events, digital sweeping, and multi-device setups for enhanced signal analysis.
Explore software-defined radio signal processing using affordable microcontrollers. Learn hardware architecture, signal processing techniques, and practical applications for digital communications and RF hacking.
Explore wireless networking using audio signals, covering PSK31 encoding, Fourier transforms, and data structures. Learn innovative techniques for airgap communication and content-addressable storage.
Explore innovative data exfiltration techniques using social media platforms, focusing on overcoming limitations and enhancing covert communication methods for cybersecurity professionals.
Explore Python-based post-exploitation techniques for Windows and Mac, covering phishing, host triage, domain enumeration, and persistence methods in this comprehensive cybersecurity presentation.
Explore the evolution of botnet empires, their lifecycle, functions, and detection methods. Learn about famous botnets, takedown attempts, and manual analysis techniques.
Explore ethical challenges of in-home robots, including privacy, security, and social implications. Discusses robot personalities, authority, and potential misuse in various scenarios.
Get personalized course recommendations, track subjects and courses with reminders, and more.