Courses from 1000+ universities
Seven years after replacing a Yale president with a fintech CEO, Coursera picks an Amazon veteran to help fix its slowing growth and falling stock price.
600 Free Google Certifications
Artificial Intelligence
Web Development
Digital Marketing
Introducción a la gestión de proyectos
L'Italiano nel mondo
Cybersecurity Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how library science principles can enhance information security practices, improving data organization, retrieval, and overall cybersecurity effectiveness.
Explore Proving Ground, a powerful OSINT tool, and learn its methodology, benchmarks, and limitations compared to other tools in this comprehensive overview.
Explore techniques for backdooring MS Office documents using secret master keys, uncovering potential vulnerabilities and security risks in widely-used productivity software.
Explore security vulnerabilities, consumer protection laws, and IoT's impact on legal frameworks. Gain insights into evolving cybersecurity challenges and their legal implications.
Explore advanced code injection techniques and zero-day vulnerabilities without writing code. Learn cutting-edge cybersecurity strategies for identifying and exploiting system weaknesses.
Explore software-defined radio exploits and their implications for wireless security in this comprehensive presentation on cutting-edge RF technology and potential vulnerabilities.
Explore innovative techniques for bridging airgaps without radio technology, uncovering potential vulnerabilities in secure systems and networks.
Explore underground Wi-Fi hacking techniques for web penetration testing, covering hijacking, evil twin attacks, client vulnerabilities, and man-in-the-middle exploits using tools like Pineapple and Kali Linux.
Explore blockchain technology, Bitcoin mechanics, and data analysis techniques to uncover insights from cryptocurrency transactions and wallets.
Explore the future of automated penetration testing, its impact on the industry, and strategies for adapting to evolving cybersecurity challenges.
Explore strategies for implementing security measures from external perspectives, enhancing organizational resilience against cyber threats and vulnerabilities.
Explore password alternatives, their effectiveness, and implementation challenges in modern cybersecurity. Gain insights into emerging authentication methods and their impact on security practices.
Explore advanced hacking techniques and their potential impact on organizational security. Learn about sophisticated compromise methods and strategies for effective defense.
Explore social engineering in namespace compromises, examining case studies, power dynamics, and engineering techniques to understand and mitigate security vulnerabilities.
Learn about PAL, a tool for secure secret management in Docker containers. Explore enterprise password management, configuration tools, and containerized deployments with practical applications and demos.
Get personalized course recommendations, track subjects and courses with reminders, and more.