Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore AI's role in cybersecurity, focusing on advanced persistent threats, intrusion detection systems, and vulnerability analysis using ontologies and reasoning techniques.
Explore ONR's cyber research strategy, focusing on resilient systems, software complexity, and future heterogeneous computing. Learn about funding opportunities in naval cybersecurity.
Explore secure execution intervals and reboot strategies for cyber-physical systems. Learn about the Resecure framework and custom base extensions for Arm processors to enhance security.
Explore career pathways in healthcare cybersecurity through technology badges, certificates, and degrees, focusing on digital transformation and industry-specific skills.
Learn essential operational security concepts, from browser fingerprinting to privacy threats, and explore strategies to protect your digital identity in today's interconnected world.
Explore a stealthy lateral movement strategy for cybersecurity, focusing on the novel ShadowMove technique, its architecture, implementation, and potential impact on network security.
Explore innovative techniques for securing CAN-based cyber-physical systems against denial and spoofing attacks, focusing on the CANSentry approach and its implementation.
Explore advertising technology, tracking methods, and mitigation strategies for Android and iOS devices in this informative session on digital privacy and security.
Explore database security through workload modeling, focusing on performance metrics, behavioral patterns, and insider threat detection techniques.
Explore security threats in crowdsourcing, analyze research findings, and learn strategies for protecting data integrity and quality control in online surveys and annotations.
Explore intrusion detection systems in resource-limited settings, focusing on host-based and network-based IDS, data gathering, testing environments, and performance analysis.
Explore the human element in cybersecurity, focusing on cognitive hacking techniques, human limitations, and strategies to enhance human performance in defending against cyber threats.
Explore techniques for adversarial attacks on speech recognition systems, focusing on Amazon Echo and Kodi. Learn about blackbox approaches and philosophical implications.
Comprehensive overview of Armitage and Metasploit for penetration testing, covering information gathering, exploitation, and post-exploitation techniques through live demonstrations and practical examples.
Explore challenges and solutions for securing big data in AI, including hardware support, federated learning, and privacy-preserving techniques for data science and machine learning.
Get personalized course recommendations, track subjects and courses with reminders, and more.