Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore LoRa security: limitations, attacks, and defensive strategies for smart city and IoT networks. Learn to build secure LoRa solutions for industrial and domestic applications.
Explore mischievous network devices and pranks using household electronics, including tales of international mishaps and Wi-Fi shenanigans.
Explore open-source malware analysis tools and techniques for file, URL, network traffic, and memory image analysis. Learn to build an automated analysis lab by chaining tools together.
Explores zero-day vulnerabilities in OEM Android customizations, demonstrating how these modifications can undermine Google's security measures and affect millions of devices worldwide.
Explore automated techniques for identifying security flaws in source code, from simple scripts to advanced analyzers, and learn to integrate them into continuous integration systems for early bug detection.
Explore automated WiFi phishing attacks using wifiphisher, an open-source tool. Learn about Evil Twin and Karma attacks, phishing scenarios, and countermeasures to protect against these threats.
Explore the human factor in cybersecurity, understanding user fears and motivations to effectively improve behaviors and engage users for better online safety.
Explore vulnerabilities in aircraft collision avoidance systems, potential exploits for aerial chaos, and strategies for enhancing aviation security and defense mechanisms.
Explore reverse engineering of proprietary network protocols, uncovering security flaws in financial software through case studies and practical guidelines for protocol analysis.
Explore DarkComet's vulnerability to gain insights into attacker campaigns, extract valuable information, and potentially identify the attacker's personal details and infrastructure.
Explore the intersection of privacy, security, and communication in instant messaging platforms, examining potential risks and ethical considerations.
Discover effective log management techniques and their crucial role in cybersecurity. Learn to harness the power of logs for enhanced threat detection and incident response.
Humorous exploration of information security concepts, challenges, and best practices, offering unique insights and practical advice for professionals in the field.
Explore psychological techniques for effective communication and influence in cybersecurity, drawing insights from Jedi mind tricks to enhance professional interactions.
Explore Layer 8 Security with Brian Honan, delving into human-centric cybersecurity strategies and their critical role in protecting organizations from evolving threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.