Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore hardware security vulnerabilities in smart energy meters, covering threat classifications, current trends, and testing methodologies for advanced metering infrastructure and grid security.
Explore ICS/OT security compliance beyond vulnerability assessment. Learn to build a comprehensive security program integrating external and internal regulations for critical industrial environments.
Explore cybersecurity insurance essentials, including policy components, data elements for risk assessment, and key security controls. Learn to determine appropriate coverage and understand industry standards.
Explore industrial cybersecurity, ICS threats, and resilience strategies using ISA-62443. Learn to assess and protect critical infrastructure from cyber attacks in the Energy, Resources, and Industrials sector.
Exploring cyber-physical security beyond fear-mongering, this talk examines root causes of vulnerabilities and proposes better approaches to embed security analysis in system design.
Explore deep learning applications in cybersecurity, including use cases, data pipelines, algorithms, and real-world deployment challenges. Learn how AI can combat ransomware and other cyber threats.
Exploración detallada de la explotación del heap XNU, analizando dos vulnerabilidades del kernel y tres exploits. Cubre internos de XNU, técnicas de explotación y cambios entre versiones de iOS.
Exploring checkm8 vulnerability in iOS SecureROM, its exploitation for jailbreaking, and updates on pongoOS development. Insights into cross-platform challenges and future plans for iOS security research.
Explore vulnerabilities in Ruckus AP devices, including pre-authentication remote code execution exploits. Learn about research methods, discovered CVEs, and a framework for cross-architecture analysis.
Explore ML techniques to detect and prevent authorization bypass vulnerabilities in web applications, focusing on successful attacks and minimizing false positives.
Explore bug bounty programs' challenges and realities from multiple perspectives, offering insights into their evolution, limitations, and potential for improvement in cybersecurity.
Learn essential digital security techniques for analyzing data and information, focusing on threat identification, communication safety, and practical tools for journalists and civil society groups.
Explore CTF competitions: learn security through challenges in web, crypto, reverse engineering, and more. Gain insights on dos and don'ts for successful participation in HackIM CTF.
Explore advanced techniques for detecting malicious patterns in event streams using behavioral indicators and machine learning, focusing on early detection and automated pattern discovery.
Comprehensive overview of STIX/TAXII 2 standards for Cyber Threat Intelligence, covering key concepts, data models, and interoperability challenges in threat intelligence sharing.
Get personalized course recommendations, track subjects and courses with reminders, and more.