Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive overview of ransomware, including history, current attacks, hacker groups, and defense strategies. Explores cyber security frameworks and principles for effective recovery and protection.
Hands-on workshop for non-programmers to learn fuzzing techniques. Covers environment setup, tools like AFL and Honggfuzz, instrumentation, input selection, and crash analysis. Suitable for beginners to intermediate level.
Learn strategies for secure migration from on-premise to Azure Cloud, focusing on real-time scenarios, architecture design considerations, and Azure services for seamless transition while addressing security challenges.
Cybersecurity experts discuss operationalizing threat intelligence, moving from reactive to proactive approaches, and addressing challenges in cloud adoption and workforce training for enhanced security.
Explore Android Runtime's evolution, optimization techniques, and structure. Learn to analyze apps by modifying ART to extract real-time information and develop effective analysis techniques without code access.
Explore Azure Sphere IoT security features, vulnerabilities discovered during Microsoft's research challenge, and a privilege escalation chain for acquiring Azure Sphere Capabilities.
Explore 5G telecom security challenges, improvements, and implementation issues. Learn about virtualization risks, DDOS threats, and industry initiatives like NESAS in this comprehensive overview.
Explore the evolution of security research and disclosure, from historical "unbreakable locks" to modern challenges in IoT, blockchain, and AI, with insights on ethical hacking and vulnerability reporting.
Explore vulnerabilities in macOS antivirus software through XPC exploitation, uncovering security flaws and providing guidance for developers to create secure XPC services.
Explore evolving enterprise security architecture beyond traditional layered defense, addressing modern challenges like advanced hacking, cloud adoption, and remote work to enhance organizational cybersecurity.
Comprehensive workshop on extracting data from damaged Android devices, covering soldering, retrieval of device information, and extraction of various data types for forensic analysis.
Explore machine learning for real-time intrusion detection in cybersecurity. Learn to build a system using AI techniques, featuring insights from Google's Lead Security Engineer Varun Kohli.
Explore WebRTC vulnerabilities in Android messaging apps, their exploitation, and mitigation strategies. Learn about security research techniques and mobile application security.
Explore automated threat intelligence for proactive cybersecurity. Learn to collect, analyze, and share actionable insights in real-time, enhancing organizational defense against evolving threats.
Explore novel ransomware techniques, including virtual machine deployment for attacks. Learn about attacker strategies, detection methods, and cybersecurity insights from a malware specialist.
Get personalized course recommendations, track subjects and courses with reminders, and more.