Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore big data analysis for cybersecurity using Hadoop, tackling malware, network traffic, and log files at scale to overcome processing limitations and enhance threat detection.
Explore innovative approaches to security awareness training, focusing on social engineering techniques to create positive change and effective communication strategies for lasting impact.
Aprenda a evitar erros comuns na resposta a incidentes de segurança cibernética, com foco em preservação de evidências, análise de dados e estratégias eficazes de contenção.
Explore ARM exploitation, reverse engineering, and vulnerability analysis through the lens of hacking an internet-enabled rabbit toy, uncovering authentication bypasses and remote code execution bugs.
Explore bug bounty dynamics, structure, and benefits for both hunters and companies. Learn strategies for successful programs and navigating challenges in this evolving cybersecurity landscape.
Learn to transform your phone into a low-cost IMSI catcher detector. Explore mobile security vulnerabilities, silent SMS detection, and IMSI catcher identification techniques in this comprehensive tutorial.
Dive deep into Meterpreter's inner workings, exploring its lifecycle, Reflective DLL Injection, and migration techniques. Gain technical insights into this powerful Metasploit payload for Windows systems.
Explore creative problem-solving and repurposing through the lens of building a bionic hand from a coffee maker. Learn innovative approaches to finding potential in everyday objects.
Novel USB attacks for remote control of air-gapped machines with minimal forensic footprint. Explores stealthy bi-directional channels, remote connectivity, and offloading complexity to hardware. Releases open-source toolset using freely available hardwa…
Explore JTAG exploitation techniques for rooting devices, covering physical layer access, data protocols, and advanced memory analysis for security professionals.
Explore malware analysis techniques, from detection to eradication, using free tools. Learn to identify indicators of compromise and effectively remove threats from enterprise networks.
Explore Meterpreter's evolution, new features, and advanced techniques for red team engagements. Learn about stageless payloads, transport modification, and persistence to enhance network penetration capabilities.
Explore affordable and accessible power side channel attacks on microcontrollers using simple techniques and low-cost equipment, demystifying complex security vulnerabilities.
Explore the evolution and impact of cybersecurity as a national security issue, examining diverse global approaches and their implications for future policy and strategy.
Explore the process of reverse engineering and modding a vintage VTech computer to add save functionality, preserving childhood nostalgia while enhancing its capabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.