Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore IoT security vulnerabilities and research methodologies with insights on ecosystem structures, live demonstrations, and manufacturer collaborations for mitigation strategies.
Explore 5 dangerous web vulnerabilities beyond OWASP Top 10, covering exploits and mitigations for both developers and pentesters to enhance application security.
Explore ransomware's impact on MBR, boot process manipulation, and malicious kernel code execution. Learn to debug MBR and understand native code execution without APIs in this technical deep dive.
Explores Windows named pipes as potential security vulnerabilities, covering enumeration, scanning, sniffing, fuzzing, and exploitation techniques, with insights on mitigation and defense strategies.
Explore methodologies and tools for investigating connected devices in criminal cases, addressing challenges and introducing new resources for digital forensics.
Explore Windows sandbox vulnerabilities in popular applications, evaluating protection mechanisms and uncovering flaws in practical sandboxing techniques.
Gain insider knowledge on network vulnerabilities, learn about CVEs, and discover proactive techniques to protect against cyber threats using free tools and heuristic systems.
Explores security risks of SVG images on the web, covering potential exploits, scripting vulnerabilities, and mitigation strategies for developers and security professionals.
Explore Agnitio, a comprehensive tool for secure code review, offering checklists, guidance modules, and automated analysis to enhance software development security practices.
Explore offensive XSLT techniques, uncovering vulnerabilities in applications using XSLT engines. Learn systematic review methods to identify high-impact security risks.
Explore strategies for CISOs to enhance organizational security through understanding human behavior, influencing stakeholders, and effective communication in complex environments.
Explore time-based security with Winn Schwartau, covering risk measurement, protection mechanisms, and defensive strategies for effective cybersecurity management.
Explore cybersecurity challenges with experts discussing international cyber law, counterattacks, and the future of digital threats in this thought-provoking panel.
Explore advanced evasion techniques used by cybercriminals to bypass network security, their impact on corporate networks, and the challenges they pose to current security solutions.
Explore nonverbal human hacking techniques, including NLP, body language, and microexpressions, to understand how social engineers manipulate targets for easier access to companies.
Get personalized course recommendations, track subjects and courses with reminders, and more.