Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ONR's cyber research strategy, focusing on resilient systems, software complexity, and future heterogeneous computing. Learn about funding opportunities in naval cybersecurity.
Learn essential operational security concepts, from browser fingerprinting to privacy threats, and explore strategies to protect your digital identity in today's interconnected world.
课程聚焦于自主仿真软件的使用及仿真APP开发,包括软件介绍、仿真流程的演示及教学。
Explore a stealthy lateral movement strategy for cybersecurity, focusing on the novel ShadowMove technique, its architecture, implementation, and potential impact on network security.
Explore innovative techniques for securing CAN-based cyber-physical systems against denial and spoofing attacks, focusing on the CANSentry approach and its implementation.
Explore advertising technology, tracking methods, and mitigation strategies for Android and iOS devices in this informative session on digital privacy and security.
Explore database security through workload modeling, focusing on performance metrics, behavioral patterns, and insider threat detection techniques.
Explore security threats in crowdsourcing, analyze research findings, and learn strategies for protecting data integrity and quality control in online surveys and annotations.
Explore intrusion detection systems in resource-limited settings, focusing on host-based and network-based IDS, data gathering, testing environments, and performance analysis.
Explore the human element in cybersecurity, focusing on cognitive hacking techniques, human limitations, and strategies to enhance human performance in defending against cyber threats.
Explore AI's role in cybersecurity, focusing on advanced persistent threats, intrusion detection systems, and vulnerability analysis using ontologies and reasoning techniques.
Explore techniques for adversarial attacks on speech recognition systems, focusing on Amazon Echo and Kodi. Learn about blackbox approaches and philosophical implications.
Explore secure execution intervals and reboot strategies for cyber-physical systems. Learn about the Resecure framework and custom base extensions for Arm processors to enhance security.
Comprehensive overview of Armitage and Metasploit for penetration testing, covering information gathering, exploitation, and post-exploitation techniques through live demonstrations and practical examples.
Explore challenges and solutions for securing big data in AI, including hardware support, federated learning, and privacy-preserving techniques for data science and machine learning.
Get personalized course recommendations, track subjects and courses with reminders, and more.