Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore smart meter vulnerabilities, AMI systems, and Zigbee security. Learn attack vectors, access methods, and common security issues in utility infrastructure.
Explore how everyday appliances can be exploited for malicious purposes, uncovering vulnerabilities and discussing potential security risks in common household devices.
Explore advanced SQL injection techniques for exploiting PDF vulnerabilities, focusing on reflected attacks and their potential impact on web application security.
Insider's guide to exploiting vulnerabilities in Microsoft Dynamics Great Plains, revealing security weaknesses and potential attack vectors in this widely-used ERP system.
Explore Lotus Notes security vulnerabilities, focusing on password hashes. Learn about enumeration techniques, tools, and mitigation strategies for this widely-used enterprise software.
Explore the Badmin Project, a groundbreaking initiative presented at BSidesLV 2012. Discover innovative approaches to system administration and security challenges in this engaging talk.
Explore cloud security challenges, application vulnerabilities, and hacking techniques with experts Andrew Hay and Matt Johansen in this insightful BSidesLV presentation.
Explore advanced web application security testing techniques using Burp Suite, uncovering vulnerabilities and exploits often overlooked by standard security practices.
Explore RFID vulnerabilities and security implications with expert Terry Gold. Gain insights into potential risks and learn strategies for protecting RFID-based systems.
Explore the fourth V of Big Data and its implications for mythical creature discovery in this thought-provoking talk by Davi Ottenheimer at BSidesLV.
Learn advanced techniques for detecting and intercepting network intruders using Ambush, a powerful tool for cybersecurity professionals seeking to enhance their defensive capabilities.
Explore ASEF, a framework for evaluating Android security. Learn about its features, implementation, and potential impact on mobile app security assessment and vulnerability detection.
Insightful analysis of current security trends, challenges, and future directions in the cybersecurity landscape, presented by industry expert Jack Daniel at BSidesLV 2012.
Explore puzzle competitions, their benefits, and strategies for success in this engaging talk by Christopher Lytle. Gain insights into problem-solving techniques and competitive puzzle-solving.
Explore wireless capture techniques, legal considerations, and essential tools for effective signal reconnaissance and analysis in this comprehensive introduction.
Get personalized course recommendations, track subjects and courses with reminders, and more.