Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore insulin pump vulnerabilities and their real-world implications with security researcher Jay Radcliffe, who shares personal insights and technical findings on medical device security.
Explore collaborative penetration testing using Lair, a tool for efficient teamwork in security assessments. Learn about vulnerability management, commands, and scripting for enhanced testing workflows.
Explore strategies for transitioning into management roles in the security industry, focusing on success factors, motivations, and overcoming challenges.
Explore advanced techniques for detecting Android malware using innovative heuristics and data analysis methods to uncover hidden threats and improve mobile security.
Explore strategies for managing the aftermath of social engineering attacks and learn effective response techniques to mitigate damage and prevent future incidents.
Explore fantasy defense strategies inspired by D&D and siege warfare, applying them to real-world cybersecurity challenges in this innovative and engaging presentation.
Learn to create valuable wordlists from GitHub repositories using Gitdigger. Explore techniques for data extraction, processing, and generating outputs for various security applications.
Explore game theory strategies and their applications in security, psychology, and society. Learn about equilibrium, signaling, and iterated games to enhance decision-making skills.
Explore techniques to bypass Internet Explorer's XSS filter, uncovering vulnerabilities and enhancing web security knowledge.
Explore innovative data transfer techniques to enhance security without compromising connectivity. Learn about unidirectional gateways, database replication, and state transfer devices for improved network protection.
Explore the concept of "Proving Ground" and its significance in cybersecurity through Eric Rand's insightful presentation at BSidesLV 2014.
Discover strategies for effective hiring in cybersecurity, from building a talent bench to conducting insightful interviews. Learn to identify top candidates and avoid common pitfalls in the recruitment process.
Explore iOS URL schemes and their security implications, focusing on potential vulnerabilities and exploitation techniques in mobile app communication.
Learn to create a portable, cost-effective cybersecurity training platform using Raspberry Pi. Explore setup, challenges, and future capabilities for hands-on learning experiences.
Explore the dynamic between hackers and auditors, examining mindsets, skills, and approaches to cybersecurity. Gain insights into effective IT auditing and hacking techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.