Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore anti-forensics techniques for Windows, Linux, and Android, covering memory analysis, encryption, and hardware implants. Learn to protect digital evidence and understand forensic challenges.
Explore physical security vulnerabilities in doors and padlocks, covering various components, attack methods, and protective measures for enhanced security awareness.
Strategies for building and operating an effective internal adversarial simulation team, covering threat analysis, offensive techniques, and defensive metrics to enhance cybersecurity posture.
Explore threat intelligence creation using Evernote, covering data-driven feeds, task management, and open-source intelligence gathering for effective organizational security strategies.
Exploring the future of cybersecurity, balancing technology and talent, and addressing challenges in the industry through automation, red teaming, and strategic focus.
Unveiling hidden WiFi communication techniques, exploring covert methods, and analyzing security implications of invisible wireless networks.
Explore mobile network vulnerabilities, SIM card access techniques, and baseband firmware analysis. Learn about "wormholes" in smartphones and their potential for identity theft and unauthorized authentication.
Exploring JavaScript cryptography's vulnerabilities, debunking myths, and analyzing real-world implementations to provide an updated perspective on its security challenges and potential solutions.
Explore Thunderbolt DMA attacks beyond FireWire adapters, discussing novel approaches and potential vulnerabilities in current hardware systems with Thunderbolt ports.
Explore how integrating security, legal, and procurement can enhance software security from the start, reducing vulnerabilities and improving vendor accountability in the development process.
Explore PowerShell attack techniques, forensic artifacts, and investigation methods for detecting and mitigating threats in Windows environments.
Hackers Joe Grand and Zoz share behind-the-scenes insights from their TV show "Prototype This," revealing challenges and innovative solutions in creating unique prototypes under tight constraints.
Explore real-time analysis and visualization techniques for cybersecurity, covering data collection, processing, and reporting using advanced technologies like MongoDB, Redis, and API integration.
Dissecting SAP Diag protocol to uncover vulnerabilities, explore attack vectors, and enhance security in SAP Netweaver systems through novel tools and techniques for protocol analysis and exploitation.
Explore HTML5's new features from an attacker's perspective, uncovering potential security vulnerabilities and innovative attack vectors in modern web browsers.
Get personalized course recommendations, track subjects and courses with reminders, and more.