Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the emerging field of DNA cryptography, its future implications, and ethical considerations in data security and biological encryption systems.
Explore potential security vulnerabilities and threat landscapes within the InterPlanetary File System (IPFS) protocol through expert analysis and real-world examples.
Explore container security challenges and reduction strategies to enhance your Docker environment's protection against vulnerabilities and potential threats.
Dive into a revealing analysis of ransomware operations through a critical OPSEC failure, uncovering valuable intelligence insights and defensive strategies against cybercrime toolsets.
Dive into a detailed analysis of the Christmas Hancitor malware campaign, exploring its infection chain, delivery methods, and technical characteristics.
Discover how to effectively fuzz USB drivers using Raw Gadget, exploring techniques for finding and exploiting vulnerabilities in USB device drivers through practical demonstrations.
Explore key insights from an analytical study of CISO job postings, examining role requirements, market expectations, and emerging trends in cybersecurity leadership positions.
Discover key insights and lessons learned from exposing Atlassian's infrastructure to the internet, exploring security implications and best practices for protecting enterprise systems.
Explore the evolving landscape of ransomware threats, attack patterns, and defense strategies through expert analysis of current trends and real-world cases.
Dive into the mechanics of system calls, exploring both direct and indirect implementations while understanding their journey from high-level to low-level programming concepts and security implications.
Discover how DNS4EU's protective DNS service enhances cybersecurity across Europe, exploring its implementation, benefits, and role in safeguarding digital infrastructure.
Discover essential principles and practices of integrating security throughout the software development lifecycle with guidance from security expert Ana Oprea.
Discover effective strategies for optimizing security tools in CI/CD pipelines, moving beyond basic implementation to achieve meaningful security improvements and practical outcomes.
Dive into hardware security analysis and rooting techniques for Cradlepoint IBR600 routers, exploring vulnerabilities and practical exploitation methods for network devices.
Explore automotive diagnostic system vulnerabilities and security weaknesses, focusing on attack vectors, exploitation techniques, and protective measures for modern vehicle systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.