Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore password security challenges, best practices, and innovative solutions for robust authentication in the digital age.
Explore practical applications of academic research in cybersecurity, including experiment testing, paper analysis, and interdisciplinary approaches. Learn to leverage academic tools for real-world problem-solving.
Discover strategies to improve hiring practices, identify top talent, and overcome candidate shortcomings. Learn effective techniques for evaluating potential and making informed recruitment decisions.
Explore innovative data visualization techniques for information security, covering ELQ Stack, organic visualization, machine learning, anomaly detection, and similarity engines.
Discover strategies to incentivize positive changes in security culture through gamification, fostering engagement and improving overall organizational cybersecurity practices.
Learn techniques to modify Volume Shadow Copy snapshots, understand VSS basics, and explore methods to detect tampering in forensic analysis.
Explore automated techniques for discovering cryptographic vulnerabilities, focusing on differential fuzzing and CDF interfaces to enhance security testing efficiency.
Explore the complexities of influence and relationships in cybersecurity through a candid keynote addressing past mistakes and lessons learned for better industry collaboration.
Explore the Least Authority File System, a secure and privacy-focused approach to data storage and sharing, presented by Zooko at BSidesLV 2013.
Explore cellular metabolism hacking through mitochondrial targeting, uncovering potential impacts on health, energy, and longevity in this intriguing lightning talk.
Explore how information theory can revolutionize cybersecurity through language leverage, visualization, and innovative approaches to incident response and threat intelligence.
Discover effective strategies to advocate for risk management, overcoming resistance and demonstrating its value to stakeholders and yourself in this insightful presentation.
Explore improved cybersecurity metrics with Walt Williams, focusing on practical approaches to measure and enhance security effectiveness in organizations.
Explore mainframe security vulnerabilities, including password limitations and hashing weaknesses. Learn about the Master Console, ISPF file editor, and using Netcat on UNIX systems for mainframe penetration testing.
Explore smart meter vulnerabilities, AMI systems, and Zigbee security. Learn attack vectors, access methods, and common security issues in utility infrastructure.
Get personalized course recommendations, track subjects and courses with reminders, and more.