Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Overcome barriers to proper network segmentation with practical strategies, including the coin slot rail approach, to enhance security and maintain efficient internal traffic flow.
Explore the vulnerabilities of phone systems and network storage devices, uncovering security flaws and potential exploits in administrative interfaces and user access.
Explore cybersecurity careers, professional development, and next steps with experts Josh Corman and Beau Woods in this Q&A session from BSidesLV 2014.
Learn to optimize your Intrusion Detection System (IDS) with expert techniques for sensor placement, rule customization, and traffic analysis, enhancing network security and reducing false positives.
Explore innovative approaches to threat intelligence, focusing on data collection, automation, and analysis using the Diamond Model for more effective cybersecurity strategies.
Explore SSL certificate validation, CA testing, and session caching. Learn key aspects of cybersecurity through Star Trek-themed modules for enhanced understanding and practical application.
Explore VPN behavior under packet loss, analyzing timing patterns and network algorithms to understand security implications and potential vulnerabilities.
Explore blind hashing for enhanced password security, covering attack vectors, online vs offline attacks, and strategies to scale and protect against various threats.
Explore innovative techniques for enhancing password-based encryption through I/O hardness, comparing schemes and costs to improve security in the digital age.
Learn essential hardware hacking techniques focusing on Serial and JTAG interfaces. Explore embedded devices, TTL signaling, and tools like OpenOCD for effective device communication and manipulation.
Explore the hidden risks of shadow IT, IoT, and mobile workforce in cybersecurity. Learn strategies for regaining control and mitigating threats in the modern digital landscape.
Explore evolving attacker strategies and game-changing defense techniques in cybersecurity. Learn about manual intervention, deconstruction, and layered approaches to stay ahead of threats.
Explore medical device cybersecurity with experts, covering FDA regulations, premarket reviews, and future developments in this informative talk on patient safety and healthcare technology.
Discover a young hacker's journey, exploring vulnerable platforms, wargames, and online challenges. Learn practical tips and guidelines for aspiring cybersecurity enthusiasts.
Explore YubiKey's versatile 2-factor authentication capabilities, from setup to advanced security features. Learn implementation techniques for various projects and understand potential vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.