Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploración de la criptografÃa como negocio global: tendencias, oportunidades y desafÃos en el mercado internacional de seguridad de la información.
Explore advanced techniques in memory forensics and security analytics for detecting unknown malware, enhancing your cybersecurity skills and threat detection capabilities.
Discover privacy-preserving techniques for neural network inference through practical strategies and implementation methods for securing machine learning models while maintaining functionality and performance.
Dive into cybersecurity insights and hacking expertise from DefCamp 2024, featuring embedded systems expert Ciubotaru Gabriel's presentation on brewing your own security solutions.
Dive into modern phishing techniques and countermeasures through real-world examples and expert analysis from DefCamp 2024's cybersecurity conference presentation by threat researcher Alexandru-Cristian BardaÈ™.
Explore the concerning world of deepfake technology, its detection methods, and cybersecurity implications through expert insights from a leading cybersecurity conference presentation.
Dive into a real-world cybersecurity investigation as experts from Mandiant share their experience tracking and analyzing an active threat actor, revealing key investigation techniques and findings.
Explore the intersection of AI, quantum computing, and cybersecurity through expert insights on emerging threats, defensive strategies, and future security challenges in the digital landscape.
Discover techniques for uncovering hidden secrets within public Amazon Machine Images (AMIs) through expert insights on AWS security vulnerabilities and offensive security practices.
Discover how to leverage LLM technology for automating security QA reviews, enhancing vulnerability detection and streamlining the security assessment process in modern development workflows.
Discover how homoglyph-based attacks can bypass LLM detection systems through an expert analysis of cybersecurity vulnerabilities and countermeasures in AI language models.
Discover effective threat intelligence-driven defense strategies through expert insights on implementing comprehensive cybersecurity measures and enhancing organizational security posture.
Discover essential strategies for integrating IT and OT security systems, focusing on comprehensive protection methods and unified security approaches for modern industrial environments.
Explore modern cybersecurity threats and scam techniques through expert analysis of current trends, vulnerabilities, and protective measures in the digital landscape.
Dive into hardware security fundamentals as Linux expert Ignat Korchagin explores TPM integration with the Linux kernel, revealing advanced protection mechanisms and implementation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.