Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cybersecurity challenges and technological solutions for smart cities, focusing on protecting critical infrastructure and citizen data from evolving cyber threats.
Explore the intriguing connection between lockpicking and IT security in this DefCamp 2017 talk, uncovering shared principles and techniques that enhance understanding of both physical and digital security.
Aprenda técnicas avançadas de pentesting para aplicativos Android, explorando vulnerabilidades e métodos de segurança em uma palestra prática da conferência DefCamp.
Explore vulnerability assessments on SCADA networks and learn techniques to outsmart the smart grid in this insightful presentation from DefCamp 2014.
Explore satellite security implementation in CubeSats, including challenges and solutions. Learn about hands-on experiences and innovative approaches to fixing vulnerabilities in space technology.
Explore white hat hacker bounty programs and their role in enhancing online security. Learn about ethical hacking practices and their impact on improving digital environments.
Explore an unusual case of C2 over DNS from specific firewalls, presented by Piotr Głaska at DefCamp Cluj-Napoca 2024. Gain insights into this unique cybersecurity scenario and its implications.
Insights into combating ransomware from a cybersecurity expert, sharing real-world experiences and strategies for incident response and threat mitigation.
Explore AI-driven security orchestration for 6G networks, focusing on automated threat detection and response in complex, heterogeneous environments.
Explore vulnerabilities in satellite, aerospace, avionics, maritime, and drone systems. Learn about potential security risks and hacking techniques in these critical infrastructures.
Análisis detallado de un sofisticado ataque de smishing bancario que aprovecha la imagen de Posta Romana, revelando técnicas y contramedidas para mejorar la seguridad cibernética.
Cybersecurity expert shares real-world experiences from Security Operations Center, offering insights into threat detection, incident response, and best practices for defending against cyber attacks.
Explore code injection via arbitrary pointer overwrite in this cybersecurity presentation. Learn about vulnerabilities, hacking techniques, and defensive strategies from a Bitdefender security researcher.
Explore AI's dual impact on cybersecurity: enhancing defenses while posing new threats. Gain insights from expert Alexander Benoit on navigating this complex landscape in the digital age.
Explore automotive cybersecurity challenges and solutions in the digital age. Learn about emerging threats, protective measures, and industry trends for safer connected vehicles.
Get personalized course recommendations, track subjects and courses with reminders, and more.