Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ethical hacking through reverse engineering techniques, from basic tools to advanced Python methods. Learn practical skills for cybersecurity and ethical hacking in this comprehensive tech talk.
Explore human-centric cybersecurity, focusing on behavioral economics, email compromise detection, and cyber situational awareness to enhance alert systems and reduce human error.
Explore legal challenges in IoT cybersecurity, balancing technical protection with justice administration. Learn about privacy, security, and public safety concerns in the digital age.
Explore cybersecurity automation and SOAR technologies to enhance enterprise defense, response, and recovery. Learn implementation steps and benefits for future workforce preparation.
Explore cyber awareness and resilience concepts, including situational awareness, attack trends, NIST frameworks, and federal guidelines for enhanced cybersecurity posture in the digital age.
Explore OSINT in cybersecurity, learning to evaluate vulnerabilities from online information while discussing privacy and ethical implications of open-source data collection and analysis.
Learn to leverage professional associations in cybersecurity for career growth, networking, and industry insights. Discover strategies for students, educators, and professionals to maximize benefits from organizations like ISACA and ISSA.
Explore critical infrastructure security challenges in local government, including technology-enabled services, unique threats, and a policy-based control to reduce vulnerabilities by 40%.
Análisis de seguridad de la biblioteca de anuncios polÃticos de Facebook, examinando la efectividad de las polÃticas de transparencia y divulgación implementadas tras las controversias electorales de 2016.
Explore secure cloud-assisted smart cars, focusing on access control, privacy, and security in vehicular IoT. Learn about attribute-based models and AWS IoT implementation for safer driving experiences.
Explore innovative techniques for securing CAN-based cyber-physical systems against denial and spoofing attacks, focusing on the CANSentry approach and its implementation.
Explore advertising technology, tracking methods, and mitigation strategies for Android and iOS devices in this informative session on digital privacy and security.
Explore database security through workload modeling, focusing on performance metrics, behavioral patterns, and insider threat detection techniques.
Explore security threats in crowdsourcing, analyze research findings, and learn strategies for protecting data integrity and quality control in online surveys and annotations.
Explore intrusion detection systems in resource-limited settings, focusing on host-based and network-based IDS, data gathering, testing environments, and performance analysis.
Get personalized course recommendations, track subjects and courses with reminders, and more.