Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Introduction to MISP and its latest features, exploring threat intelligence sharing capabilities, data models, and collaborative analysis tools for improved cybersecurity.
Explores challenges in implementing secure random number generation in programming languages and operating systems, discussing recent developments and best practices for cryptographic security.
Explore an advanced hardware backdoor for CAN bus in connected cars. Learn about remote attacks triggered by GPS, speed, or custom parameters, with intuitive interface for payload customization.
Exploiting vulnerabilities in Microsoft's LAPS to gain unauthorized access to local administrator credentials and maintain presence on compromised systems in post-exploitation scenarios.
Explore web-based threat analysis with ManaTI. Learn to use WHOIS similarity for domain classification, improving efficiency and accuracy in detecting network security threats.
Explore Randori, an open-source honeypot built behind existing services. Learn about its conception, results, and a new model for addressing global botnet infections as cyber disease control.
Explore the complexities of cyber attack attribution, including copycats and false flags. Learn about the challenges in identifying malicious actors and the future of threat intelligence.
Verken de ethische uitdagingen en implicaties van kunstmatige intelligentie in deze diepgaande lezing over machine-ethiek door expert Matthijs Pontier.
Onderzoek naar beveiligingslekken en datalekken, van de Titanic tot moderne hackingincidenten. Analyse van herhaalde fouten en gemiste lessen in informatiebeveiliging.
Discover the intricacies of planning a massive hacker event for 5000 attendees, exploring challenges, strategies, and lessons learned from SHA2017.
Explore MISP's latest features and development progress in this presentation by Andras Iklody from CIRCL, highlighting advancements in threat intelligence sharing and analysis.
Explore web security challenges, focusing on browser vulnerabilities and emerging standards to address these issues. Learn how developers can enhance application security beyond code fixes.
Discover how to build a comprehensive Software Security Program addressing people, process, and technology challenges in software development, reducing risk and improving efficiency.
Explore GDPR's impact on information sharing in cybersecurity. Learn about compliance challenges and strategies for effective threat intelligence exchange within legal frameworks.
Uncover an undocumented Windows feature that leaks valuable hashes, enabling faster privilege escalation and domain admin access. Learn this simple yet powerful technique from experienced IT security specialists.
Get personalized course recommendations, track subjects and courses with reminders, and more.