Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Information Technology
Communication Skills
Python
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introduction to Linux
Financial Markets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore urban hacking through a real-world case study of Tel Aviv's open WiFi network, uncovering vulnerabilities and demonstrating practical exploitation techniques.
Explore IPFS: A distributed web protocol addressing internet challenges like bandwidth, latency, and data control. Learn about its architecture and potential impact on the future of online connectivity.
Explore the psychology behind social engineering, emotional triggers, and human decision-making in cybersecurity. Learn practical insights on phishing techniques and defensive strategies.
Explore advanced techniques for bypassing various virus detection methods, including signature, heuristic, behavioral, and sandbox-based approaches. Learn to craft highly evasive executables.
Explore techniques for reversing polymorphic file-infecting ransomware, covering debugging tools, malware types, and decryption methods in this hands-on cybersecurity talk from DefCamp 2016.
Aprende técnicas avanzadas para evadir firewalls de aplicaciones web, incluyendo métodos de reconocimiento, explotación de discrepancias y bypass de reglas para pruebas de penetración efectivas.
Aprenda a implementar inteligência de ameaças DIY usando Splunk. Descubra técnicas práticas para configurar, pesquisar e criar dashboards para melhorar sua segurança da informação.
Explore common mistakes in cybersecurity, including blue team, red team, and community failures. Learn valuable lessons to improve your security practices and strategies.
Explore the evolution of cybersecurity, from its origins to future trends. Gain insights into industry transformations, fundraising, acquisitions, and emerging patterns in information security.
Explore mobile cryptocoin wallet security, focusing on usability, current applications, and potential improvements. Learn about secure enclaves, key pairs, and transaction signing for enhanced protection.
Explore browser instrumentation techniques for analyzing exploit kits, with demonstrations and practical advice for enhancing web security and preventing payload execution.
Explore legal challenges in cybersecurity, including data protection laws, penetration testing contracts, and law enforcement interactions. Learn to navigate legal complexities in the infosec field.
Explore threat intelligence transformation into actionable data using innovative techniques like honeypots, passive DNS, and graph-based models for enhanced cybersecurity analysis and decision-making.
Explore Tinder's privacy, profile building, and bot vulnerabilities in this DefCamp talk on dating app security risks and potential exploits.
Explore hacking's impact on shaping actions, from hype to practical applications. Gain insights into cybersecurity challenges, collaborations, and the future of information security.
Get personalized course recommendations, track subjects and courses with reminders, and more.