Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the evolution of cybersecurity attacks and defenses, from 2001 to 2016, and learn about proactive defense strategies for the future of information security.
Discover innovative techniques for detecting network breaches using honeytokens. Learn about Canarytokens and new methods to set tripwires without agents or hardware, improving your network security.
Explore cybercrime evolution over 30 years: changing motivations, increased stakes, persistent vulnerabilities, and enduring hacking techniques. Assess lessons learned and current security landscape.
Explore automated, non-intrusive security integration into company infrastructure. Learn from successes, failures, and future improvements in implementing frictionless security programs.
Explore techniques for uncovering hidden vulnerabilities in backend systems using exploit-induced callbacks. Learn to detect and exploit asynchronous issues across various technologies and platforms.
Explore PowerForensics: a PowerShell-based toolset for live digital forensics and incident response, enabling efficient investigation of advanced cyber threats without system imaging.
Explore vulnerabilities in VxWorks, a real-time operating system, from historical exploits to cutting-edge attack techniques. Gain insights into securing critical infrastructure and embedded systems.
Explore the development of the USB armory, an open-source hardware device for security applications. Learn about its architecture, security features, and potential uses as a trusted USB device.
Explore powerful, inexpensive penetration testing using ARM-based devices, from wired/wireless dropboxes to flying drones. Control actions remotely, with devices like BeagleBone Black and Raspberry Pi 2.
Explore critical vulnerabilities in OpenType font handling across popular software, revealing potential for arbitrary code execution and bypassing exploit mitigations. Learn about reverse-engineering techniques and in-depth vulnerability analysis.
Explore PowerForensics for live digital investigations using PowerShell. Learn techniques for incident response, threat detection, and forensic analysis without imaging drives.
Explore techniques for enumerating network defenses by exploiting false positives in Intrusion Prevention Systems, revealing valuable information about security measures to potential attackers.
Explore advanced phishing techniques, leveraging tools like Phishing Frenzy and BeEF for effective campaigns. Learn from real-world statistics and engaging hacking stories to enhance your cybersecurity skills.
Learn to identify, analyze, and eradicate unknown malware in corporate networks using freely available tools. Gain practical skills for effective threat detection and response.
Learn techniques for reverse engineering C++ programs, including analyzing compiled code, understanding memory layouts, and identifying key structures. Gain practical skills for software analysis and security research.
Get personalized course recommendations, track subjects and courses with reminders, and more.