Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore RDP security risks, attacks, and mitigation strategies. Learn to deploy secure RDP servers and detect potential threats in Windows remote environments.
Explore authentication challenges in SaaS integration and cloud transformation, focusing on security pitfalls, unmanaged cloud identities, and the importance of cloud-based Identity Provider solutions.
Explore the process of designing, developing, and launching an open-source CAN bus tool. Learn about PCB design, driver development, and the challenges of bringing hardware products to market.
Unmasking cybercriminals' sophisticated techniques for account takeover attacks, focusing on machine fingerprint markets, their impact on Canadians, and strategies for protection against this growing threat.
Explore advanced device profiling bypass techniques using DHCP packet manipulation for Network Access Control systems. Learn about implementation, mechanics, and risk mitigation strategies.
Exploring coordinated vulnerability disclosure in Canada's federal government, highlighting gaps and recommending policy frameworks to enhance cybersecurity and protect security researchers.
Explore critical vulnerabilities in network equipment, from routers to firewalls. Learn about common patterns, historical context, and future trends in cybersecurity for these essential devices.
Explore AMITT framework updates for combating disinformation, including new countermeasures. Learn about recent events and practical applications in influence operations defense.
Analyse de l'utilisation malveillante des médias sociaux pendant l'élection fédérale canadienne de 2019, examinant le rôle des bots sociaux dans la manipulation du discours politique et la désinformation.
Exploring the tension between privacy and monopoly in tech, advocating for interoperability as a solution to enhance security without compromising user rights or enabling corporate dominance.
Explore GraphQL security: attack vectors, defense strategies, and hands-on learning with the Damn Vulnerable GraphQL Application. Gain insights into protecting this emerging API technology.
Explore 'repo jacking', a widespread supply chain vulnerability affecting 70,000+ open-source projects. Learn its causes, exploitation methods, and mitigation strategies to protect your GitHub-dependent projects.
Explore cryptographic best practices, common pitfalls, and secure implementations for random number generation, encryption, hashing, and more. Essential knowledge for designing and auditing cryptographic systems.
Explore imposter syndrome, self-doubt, and personal growth in tech. Learn to embrace uniqueness and overcome negative self-perceptions in this empowering talk.
Explore cryptography fundamentals, encryption methods, and attack techniques in this comprehensive workshop. Learn about hashing, ciphers, and practical approaches to breaking crypto systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.