Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about PAL, a tool for secure secret management in Docker containers. Explore enterprise password management, configuration tools, and containerized deployments with practical applications and demos.
Explore the intricacies of hacking Megatouch bartop games, uncovering vulnerabilities and potential exploits in these popular entertainment systems.
Explore innovative cybersecurity strategies addressing critical infrastructure vulnerabilities, public health issues, and workforce shortages with industry experts Joshua Corman and Beau Woods.
Explore vulnerability disclosure debates, survey insights, and strategies for improving cybersecurity practices. Learn about coordinated disclosure, multiparty challenges, and driving broader adoption of best practices.
Explore insights and challenges in labeling large-scale malware datasets, drawing from experiences with the VirusShare Corpus. Gain valuable lessons for improving malware classification and analysis.
Explore how common programs transform into sophisticated threats, examining indicators, processes, and impacts across various sectors and geographic regions.
Learn to craft compelling conference proposals, communicate effectively, and understand audience needs from seasoned experts in this informative panel discussion.
Explore advanced fuzzing techniques for binary protocols, enhancing code coverage and uncovering vulnerabilities in network applications and file systems.
Explore proactive DNS security using F5 iRules and open-source tools. Learn to detect and mitigate threats like DGAs, malformed packets, and DNS DDoS attacks for enhanced network protection.
Explore two-secret key derivation for enhanced password security. Learn about count keys, server storage, and team management in this insightful presentation on advanced cryptographic techniques.
Explore automotive cybersecurity challenges, strategies, and future implications with insights on safety-by-design, threat modeling, and critical infrastructure protection.
Explore systemic vulnerabilities in machine learning for malware detection, covering sandbox evasion, model problems, and potential solutions for improved cybersecurity.
Explore vulnerabilities in payment systems and learn techniques to secure Points of Interaction (POI) in this insightful cybersecurity presentation by industry experts.
Explore healthcare cybersecurity challenges and advancements with experts discussing regulatory perspectives, device maker insights, and physician viewpoints on cyber safety in medical technology.
Explore the intersection of past and future in cybersecurity, examining historical trends and their implications for tomorrow's digital landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.