Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the intersection of 3D printing, AI, and healthcare through FDA's medical device production systems, examining stakeholder perspectives and point-of-care implementation challenges.
Explore the evolution of international marking systems into digital protocols, examining cryptographic validation methods and potential security implications for modern border and battlefield contexts.
Delve into satellite-based air traffic control security through ADS-C protocol analysis, exploring vulnerabilities in aircraft tracking systems and potential countermeasures for aviation safety.
Explore security vulnerabilities in space mission communications through the Space Link Extension protocol, focusing on ground segment exploits and practical mitigation strategies for spacecraft control.
Explore cutting-edge vector encryption techniques and security measures to protect GenAI data from embedding inversion attacks while enabling privacy-preserving searches over encrypted vectors.
Dive into advanced strategies for infiltrating and disrupting ransomware operations by targeting their web panels, APIs, and command centers while gathering vital intelligence on threat actors.
Explore AI's role in national security through an ex-spy's lens, blending pop culture references with real-world cybersecurity insights and interactive demonstrations of AI systems.
Dive into the fascinating world of transportation security vulnerabilities and hacking methodologies with expert insights on protecting critical infrastructure and mobility systems.
Dive into real-world bug bounty hunting experiences, from simple vulnerabilities to complex exploit chains, featuring fascinating discoveries like infinite money glitches and CAPTCHA-based encryption breaks.
Dive into time-based SQL injection techniques through Operation GhostShell, featuring live demos and defense strategies for protecting against sophisticated database vulnerabilities.
Uncover insights into adversarial military philosophy taught in Chinese and Russian academies through an NSA veteran's analysis of cybersecurity strategy and information warfare challenges.
Explore machine learning pipeline vulnerabilities and learn to identify, exploit, and defend against model backdoors through input handling bugs and systematic security approaches.
Discover practical IoT hacking techniques, from selecting beginner-friendly devices to building an affordable toolkit under $100. Learn common vulnerabilities and methods to gain device access using simple tools and tactics.
Discover a sophisticated EDR bypass technique combining IAT Hooking, dynamic SSN resolution, and indirect system calls to redirect Windows subsystem execution flow while remaining undetected by traditional security measures.
Discover essential digital defense strategies for travel, focusing on free tools and OPSEC principles to protect your online presence and personal data while maintaining security awareness.
Get personalized course recommendations, track subjects and courses with reminders, and more.