Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore innovative techniques for breaching air-gapped networks, including acoustic, thermal, and electromagnetic methods, to enhance cybersecurity awareness and defense strategies.
Explore the evolution of computer worms, from early nematodes to modern neotodes, and their impact on cybersecurity in this intriguing conference talk.
Explore vulnerabilities in yacht systems and IoT devices on boats. Learn about maritime cybersecurity risks and potential attack vectors in this eye-opening presentation.
Explore p≡p (Pretty Easy Privacy), a user-friendly encryption solution for secure communication. Learn its features, implementation, and potential impact on digital privacy.
Explore effective techniques for educating and communicating complex technical concepts, focusing on innovative approaches to enhance understanding and engagement.
Explore 14 key insights for analyzing complex adversarial systems, enhancing your understanding of security challenges and strategic thinking in cybersecurity.
Explore the psychological principles behind social engineering and learn strategies for building a robust security culture within organizations.
Explore automated heap exploitation techniques and strategies for enhancing cybersecurity defenses in this insightful conference talk by ThaÃs Moreira Hamasaki.
Explore advanced YARA rule creation techniques for malware detection and analysis, enhancing your cybersecurity skills and threat hunting capabilities.
Optimize risk assessment processes using MONARC, a tool for efficient threat analysis and security measure implementation in organizations.
Explore the intersection of radical insurance groups and ransomware, examining their impact on cybersecurity and risk management in the digital age.
Explore hypervisor-level debugging techniques, their advantages, and potential obstacles in this insightful presentation by Mathieu Tarral at Hack.lu 2018.
Explore the Central Intelligence Vetting Platform presented at MISP Summit 2018. Learn about innovative approaches to intelligence analysis and information sharing in cybersecurity.
Explore techniques for creating high-quality IoCs from open-source intelligence and enhancing threat data enrichment in MISP for improved cybersecurity analysis and information sharing.
Explore quantitative methods for comparing Advanced Persistent Threats using MISP, enhancing threat intelligence analysis and cybersecurity strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.