Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore time-based analysis techniques for investigating ransomware incidents, uncovering crucial insights to enhance cybersecurity strategies and incident response.
Explore Windows Event Log IDs and their correlation with MITRE ATT&CK framework, enhancing threat detection and incident response capabilities in cybersecurity.
Explore DNS vulnerabilities and attacks with cybersecurity experts, gaining insights into threat detection and mitigation strategies for network security professionals.
Explore fileless malware and process injection techniques in Linux systems, enhancing your understanding of advanced cybersecurity threats and defense strategies.
Explore a 25-year-old vulnerability in DOS software, examining its implications and the challenges of addressing legacy security issues in outdated systems.
Explore techniques to exploit vulnerabilities in Bluetooth Low Energy 5's pseudo-random number generator, enabling potential jamming and security breaches.
Explore open-source SPI flash emulation techniques with Trammell Hudson, enhancing hardware security testing and firmware development for embedded systems.
Explore the Taskmasters APT's effectiveness through simplicity in this concise presentation by Elmar Nabigaev, focusing on key insights and practical applications.
Explore advanced Windows forensics techniques using native Microsoft tools for enhanced digital investigation and threat detection capabilities.
Explore hacktivism's role in cyber defense during wartime, focusing on lessons from Ukraine's experience and strategies for digital resistance against aggression.
Explore advanced malware analysis techniques and cutting-edge evasion methods used by sophisticated threats. Gain insights into detecting and countering elusive malicious software.
Discover strategies for exploiting bug report systems in game development, enhancing efficiency and improving overall product quality.
Explore KVM's potential as a powerful debugging platform for efficient software development and troubleshooting in virtualized environments.
Explore the current challenges in cybersecurity and discover potential solutions with expert insights on improving digital defense strategies and practices.
Explore vulnerabilities in autonomous vehicle systems, focusing on sensor and logic attack surfaces. Learn about potential security risks and mitigation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.