Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master efficient OSINT techniques for physical security, focusing on rapid intelligence gathering, predictive analysis, and actionable insights for critical situation assessment and risk management.
Discover innovative post-exploitation techniques for proxying Windows authentication protocols remotely, enabling user impersonation and domain control without elevated privileges.
Discover how to intercept and analyze HL7 medical device communications using HL7Magic, a new security testing tool designed to identify vulnerabilities in healthcare data transmission systems.
Explore software liability policies and their impact on cybersecurity through interactive legal exercises, focusing on Biden-Harris Strategy's Pillar 3 and future regulatory implications.
Delve into advanced MacOS security exploitation, exploring System Integrity Protection bypass techniques, undeletable malware creation, and essential detection strategies for security teams.
Discover how cyberpsychology and AI can empower defenders to exploit human vulnerabilities in cyber attacks, turning defense into an offensive advantage through psychological tactics.
Delve into data center power management security, exploring vulnerabilities in PDUs and DCIM systems while learning critical infrastructure protection strategies and attack vectors.
Dive into an auto security researcher's investigation of modern car theft techniques, focusing on CAN bus exploitation, vehicle security vulnerabilities, and potential protective measures.
Explore security vulnerabilities in smart vacuum robots and learn practical techniques to protect your privacy while maintaining control over these AI-enabled devices.
Explore frequency hopping techniques for protecting DIY drones against RF attacks, including implementation challenges and effective security strategies for consumer drone systems.
Uncover a critical GCP vulnerability that enables malicious apps to become invisible and unremovable from Google user accounts, exploring OAuth 2.0, exploitation techniques, and security implications.
Explore wireless security vulnerabilities in EV charging systems, focusing on CCS technology, eavesdropping risks, and potential attack vectors through power-line communication signals.
Discover how to execute long-range relay attacks on contactless credentials through ISO 14443A protocol vulnerabilities, including live demonstrations and practical mitigation strategies.
Discover advanced techniques for detecting macOS malware through network monitoring, exploring low-level APIs, private frameworks, and user-mode extensions for comprehensive threat detection.
Uncover critical security vulnerabilities in prepaid Android smartphones through detailed analysis of 32 devices, revealing system-level flaws and privilege escalation risks in pre-loaded software.
Get personalized course recommendations, track subjects and courses with reminders, and more.