Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore security vulnerabilities in wireless input devices and learn about potential attack vectors and countermeasures for enhanced cybersecurity awareness.
Explore password security pitfalls and best practices with cybersecurity expert Chris Kubecka, learning how to protect yourself and your organization from common vulnerabilities.
Explore smartphone app privacy concerns and learn strategies to protect your personal data in this insightful talk by security researcher Axelle Apvrille.
Explore advanced threat intelligence techniques using contextualized knowledge bases to enhance cybersecurity defenses and improve incident response capabilities.
Explore WHIDS integration with MISP for enhanced threat intelligence sharing and incident response capabilities in cybersecurity operations.
Explore machine learning techniques for collaborative detection of Domain Generation Algorithms (DGAs) in cybersecurity, enhancing threat intelligence and network defense capabilities.
Explore the updated indicator scoring system in MISP 2.4.116, enhancing threat intelligence analysis and improving decision-making for cybersecurity professionals.
Explore techniques for visualizing threat intelligence data from MISP and ATT&CK frameworks using Maltego, enhancing cybersecurity analysis and decision-making.
Explore recent advancements in the MISP threat intelligence platform, including enhanced features, improved performance, and expanded capabilities for cybersecurity professionals.
Learn to program FPGAs, exploring hardware design principles and practical applications in this hands-on workshop. Gain skills in digital logic and reconfigurable computing.
Learn essential offensive security techniques and strategies to protect systems from cyber threats and vulnerabilities.
Explore the complexities of responsible disclosure in cybersecurity, examining its positive aspects, challenges, and potential pitfalls through real-world examples and expert insights.
Explore passive DNS analysis techniques for threat detection and investigation, featuring insights from industry experts on leveraging pDNS data effectively.
Explore affordable side-channel attacks with practical demonstrations, learning techniques to exploit vulnerabilities in cryptographic implementations and secure systems.
Explore security vulnerabilities in industrial serial device servers and learn effective analysis techniques for identifying and mitigating potential threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.