Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Python
Digital Marketing
English for Career Development
Inglés empresarial: ventas, gestión y liderazgo
Crisis Resource Management
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the state-of-the-art security in untrusted mobile applications and learn about the latest threats and vulnerabilities in the mobile app landscape.
Explore democracy and mass surveillance in the post-Snowden era, examining the impact on privacy, security, and civil liberties in this thought-provoking DefCamp 2014 conference talk.
Explore vulnerability assessments on SCADA networks and learn techniques to outsmart the smart grid in this insightful presentation from DefCamp 2014.
Análisis crÃtico de la seguridad en sistemas SCADA, explorando vulnerabilidades y comparándolos con "queso suizo". Ofrece perspectivas sobre riesgos y mejoras en infraestructuras crÃticas.
Exploración de técnicas de hacking y seguridad informática en el contexto de redes domésticas, destacando vulnerabilidades comunes y métodos de protección.
Explore Windows 8's security features and vulnerabilities in this DefCamp conference talk. Gain insights into the operating system's architecture and potential risks for information security professionals.
Explore satellite security implementation in CubeSats, including challenges and solutions. Learn about hands-on experiences and innovative approaches to fixing vulnerabilities in space technology.
Exploración detallada del alojamiento web a prueba de balas, sus caracterÃsticas y aplicaciones en ciberseguridad. Análisis de las implicaciones técnicas y éticas de esta tecnologÃa.
Explore embedded wireless vulnerabilities in fireworks systems, revealing insecurity-by-design issues and potential risks in pyrotechnic compositions used for public displays and entertainment.
Explore advanced techniques in memory forensics and security analytics for detecting unknown malware, enhancing your cybersecurity skills and threat detection capabilities.
Explore security challenges faced by journalists and the importance of system administration skills in protecting sensitive information and sources.
Explore cognitive biases and critical thinking in Open Source Intelligence, enhancing your ability to gather and analyze information effectively for cybersecurity purposes.
Exploración de Cyber Ranges: entornos virtuales para entrenamiento y simulación de ciberataques, mejorando habilidades de defensa y respuesta en seguridad informática.
Exploración de la criptografÃa como negocio global: tendencias, oportunidades y desafÃos en el mercado internacional de seguridad de la información.
Explore the world of Tor .onion sites, examining their benefits, risks, and common configuration issues. Gain insights into the hidden web's landscape and security implications.
Get personalized course recommendations, track subjects and courses with reminders, and more.