Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comparative analysis of AWS and Azure security features, exploring identity management, storage, encryption, network security, and monitoring capabilities in both cloud platforms.
Explore realistic attacker emulation using CALDERA, implementing techniques, modeling groups, and executing end-to-end attack paths to improve defenses and investigate new threats.
Explore advanced password cracking techniques, hash preprocessing tools, and best practices for secure hashing. Learn to prevent credential stuffing and analyze real-world password dumps.
Exploring trust issues in technology, focusing on DNS and HTTPS/TLS systems. Analyzes how security measures often fail to protect average users, proposing ways to improve online safety for all.
Explore the rapid evolution of technology, our growing dependence on digital devices, and the cybersecurity challenges that arise as connected devices proliferate.
Explore real-world cloud security vulnerabilities, their root causes, and effective mitigation strategies through examples and demonstrations. Learn to protect your cloud systems from potential threats.
Explore insider threats and vulnerabilities in network domains, revealing how standard users can potentially gain full admin access and compromise security within organizations.
Explore drone security vulnerabilities, hacking techniques, and GPS spoofing methods. Learn about UK drone laws and differences between private and military drones.
Explore tools and techniques for identifying vulnerabilities in embedded devices and IoT, covering common attack vectors, responsible disclosure, and the overlap with OT/ICS security challenges.
Exploiting HTTP chunked transfer encoding to bypass egress filtering, enabling faster web shells and network pivoting during red team engagements.
Explore how e-cigarettes can be transformed into covert exploit platforms, including firmware decryption, custom functionality, and system penetration techniques.
Explore the consequences of open-source malware deployment, analyze attacker toolkits, and learn about defender opportunities in this insightful cybersecurity talk.
Discover Pi-Key: a £20 Raspberry Pi Zero device that steals Windows credentials, cracks them, and unlocks machines in under 60 seconds. Learn how it works, its components, and build your own.
Explore iOS malware's reality, recent discoveries, and implications for mobile security in this eye-opening talk challenging common perceptions about Apple device vulnerabilities.
Explore OSTrICa, an open-source framework for automated threat intelligence collection and visualization. Learn about its plugin-oriented architecture and applications in cybersecurity and incident response.
Get personalized course recommendations, track subjects and courses with reminders, and more.