Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how library science principles can enhance information security practices, improving data organization, retrieval, and overall cybersecurity effectiveness.
Explore Proving Ground, a powerful OSINT tool, and learn its methodology, benchmarks, and limitations compared to other tools in this comprehensive overview.
Explore security vulnerabilities, consumer protection laws, and IoT's impact on legal frameworks. Gain insights into evolving cybersecurity challenges and their legal implications.
Explore techniques for backdooring MS Office documents using secret master keys, uncovering potential vulnerabilities and security risks in widely-used productivity software.
Explore how common programs transform into sophisticated threats, examining indicators, processes, and impacts across various sectors and geographic regions.
Learn to craft compelling conference proposals, communicate effectively, and understand audience needs from seasoned experts in this informative panel discussion.
Explore advanced fuzzing techniques for binary protocols, enhancing code coverage and uncovering vulnerabilities in network applications and file systems.
Explore proactive DNS security using F5 iRules and open-source tools. Learn to detect and mitigate threats like DGAs, malformed packets, and DNS DDoS attacks for enhanced network protection.
Explore two-secret key derivation for enhanced password security. Learn about count keys, server storage, and team management in this insightful presentation on advanced cryptographic techniques.
Explore automotive cybersecurity challenges, strategies, and future implications with insights on safety-by-design, threat modeling, and critical infrastructure protection.
Explore systemic vulnerabilities in machine learning for malware detection, covering sandbox evasion, model problems, and potential solutions for improved cybersecurity.
Explore vulnerabilities in payment systems and learn techniques to secure Points of Interaction (POI) in this insightful cybersecurity presentation by industry experts.
Explore healthcare cybersecurity challenges and advancements with experts discussing regulatory perspectives, device maker insights, and physician viewpoints on cyber safety in medical technology.
Explore the intersection of past and future in cybersecurity, examining historical trends and their implications for tomorrow's digital landscape.
Dive into the intricacies of the Neutrino Exploit Kit, exploring its mechanisms, vulnerabilities, and impact on cybersecurity. Gain insights into advanced malware analysis techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.