Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive introduction to automotive cybersecurity, exploring vulnerabilities in modern car systems and techniques for identifying and exploiting potential weaknesses.
Explore strategies for achieving pharmaceutical compliance in cloud computing environments, addressing regulatory challenges and best practices for data security and integrity.
Explore security vulnerabilities in smart fitness equipment, focusing on treadmills. Learn about potential risks, attack surfaces, and implications for both users and corporate environments.
Explore IPv6-only networks, their benefits, and challenges through real-world case studies and application testing, including popular gaming and communication platforms.
Explore vulnerabilities in vehicle alarm systems, including signal transmitters, deactivation methods, and remote control weaknesses. Learn about code knocking and motion detector flaws.
Explore techniques to bypass Device Guard, focusing on lateral movement, trusted locations, and ActiveScript vulnerabilities in Windows environments.
Explore medical device security challenges, classifications, and vulnerabilities in healthcare organizations. Learn about regulatory guidelines and real-world examples of device defects and potential exploits.
Explore HackDMI: Learn about HDMI protocols, CEC messaging, and ARC. Discover vulnerabilities in HDMI implementations and gain insights into fuzzing techniques for digital media interfaces.
Explore Bluetooth firmware reverse engineering, security insights, and bug-finding techniques in this deep dive into wireless technology vulnerabilities.
Explore AI and ML applications in IT security, covering classification, outlier detection, and user behavior analysis for enhanced protection and threat detection.
Explore vulnerabilities in Cloud Foundry implementations, focusing on SAP HANA XS Advanced. Learn about components, concepts, and potential security risks in cloud platforms.
Explore Windows Telemetry architecture, data collection points, and management. Learn about disabling and reducing telemetry, with insights from German cybersecurity experts.
Explore Azure AD vulnerabilities, hacking techniques, and security risks in cloud environments. Learn about AD Connect, crypto magic, and service principles to enhance your cybersecurity knowledge.
Explore BloodHound's advanced features for identifying security vulnerabilities, improving attack resilience, and enhancing Active Directory defenses through graph-based analysis.
Explore Active Directory attacks from non-Windows systems using LDAP and Kerberos. Learn techniques for reconnaissance, password spraying, and ticket forging to enhance your penetration testing skills.
Get personalized course recommendations, track subjects and courses with reminders, and more.