Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore aviation security vulnerabilities through pen testing research, covering access risks, performance calculations, maintenance mode issues, and potential misunderstandings in the industry.
Explore effective third-party risk assessment beyond checklists. Learn to ask insightful questions that reveal an organization's commitment to security and trustworthiness in the software supply chain.
Explore common authentication pitfalls, costs, and phases. Learn about 2FA misconceptions, password security, and new guidelines for robust authentication practices in the digital age.
Explore cloud security vulnerabilities, historical incidents, and protective measures. Learn to identify abandoned subdomains and bypass firewalls in this eye-opening talk on hacker perspectives.
Explore why secure coding remains elusive, examining cultural issues, industry challenges, and potential solutions for integrating security into software development practices.
Explore deepfake technology's impact on cybersecurity, covering threats like fraud and fake content, as well as opportunities in biometrics and network traffic analysis.
Learn strategies for being a pioneering security engineer, covering impact, documentation, data storage, education, automation, and corporate security initiatives.
Explore CAN bus fundamentals and hands-on fuzzing techniques for automotive systems, covering ECUs, attack surfaces, and practical demonstrations using various tools and setups.
Explore badge hacking techniques, including card reader software, reading/writing cards, and security encryption, with practical insights and a Python script demonstration.
Explore VoIP phone vulnerabilities, attack methods, and security recommendations. Learn firmware access, emulation approaches, and exploit development for various VoIP devices.
Explore .NET assembly generation, embedding scripting languages, and advanced techniques for creating versatile payloads in this cybersecurity-focused talk on BYOI (Bring Your Own Interpreter).
Explore innovative approaches to enterprise security, focusing on visibility over control, with insights from Heroku's security transformation and practical lessons for implementation.
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Explore the complexities of global cyber norms, challenges in consensus-building, and potential risks in outsourcing digital governance frameworks.
Explore risk management in security, challenging misconceptions and revealing its value. Learn to interpret, measure, and leverage risk effectively for better organizational outcomes.
Get personalized course recommendations, track subjects and courses with reminders, and more.