Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore threat modeling's impact on ICS security, including benefits, timing, and cost-saving applications. Learn methodologies, tools, and advanced techniques for enhancing industrial cybersecurity.
Explore CODESYS framework vulnerabilities, Runtime weaknesses, and PDU Protocol model issues in PLC control systems. Gain insights into industrial cybersecurity challenges and potential solutions.
Learn to identify and address security vulnerabilities in smart building systems, focusing on risk assessment, business continuity, and comprehensive protection strategies.
Insights on communicating ICS risks to executives, focusing on business impact, risk prioritization, and effective presentation strategies for cybersecurity professionals.
Explore Zebrocy's unique APT tactics, multi-language malware, and evolving techniques in this cybersecurity analysis by Kaspersky's Kurt Baumgartner.
Exploring stalkerware's impact, detection, and legal challenges, with insights on protecting victims and holding perpetrators accountable.
Explore the sophisticated Chamois Android botnet, its technical complexity, anti-detection techniques, and impact on ad fraud. Learn about its infrastructure and strategies to combat this significant threat.
Explore how cybercriminals bypass anti-fraud systems by stealing digital fingerprints, with insights on advanced techniques and potential mitigations from a Kaspersky security researcher.
Explore industrial cybersecurity strategies, from historical context to modern challenges, emphasizing cyber-informed engineering and the cyber kill chain concept.
Explore blockchain's impact on industrial control, debunking myths and examining security implications for smart contracts and decentralized systems.
Explore essential components for effective ICS detection and response, covering leadership, team structure, strategies, and outsourcing considerations in industrial cybersecurity.
Explore cybersecurity challenges and solutions for modern connected trains, focusing on potential vulnerabilities, attack methods, and protective measures in the rail industry.
Explore the future of process automation, its opportunities and risks, with insights on cybersecurity, digitalization, and effective defense strategies in industrial settings.
Debunking common misconceptions about industrial cybersecurity, exploring real-world risks, and highlighting the importance of comprehensive security measures beyond staff training.
Explore cyber espionage tactics, security innovations, and false flag operations in the digital realm. Learn about Yarra Engine and its implications for industrial cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.