Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Canada's expanded surveillance laws, media coverage, court cases, and future implications for cybercrime investigations and individual privacy rights.
Explore automatic exploit generation through program analysis techniques, including instrumentation and symbolic execution, with practical demonstrations and tool insights.
Explore cache timing covert channels in x86 multi-core systems, learning techniques for inter-VM data exfiltration and reverse shell establishment using shared resources and architecture imperfections.
Explore privacy, surveillance, and oversight in the digital age, examining historical context, legal frameworks, and democratic principles shaping modern data collection practices.
Explore the science and technology behind the Chaotic Encryption Key System (CHEKS), including its concept, implementation, and practical application in a basic chat demo.
Explore gaming industry security challenges, focusing on client-side logic, network protocols, account management, and untrusted platforms to enhance overall security and user experience.
Explore object-oriented reverse engineering techniques for modern malware analysis, focusing on C++ code reconstruction and tools like HexRaysCodeXplorer for tackling complex malware frameworks.
Learn to hack your car's CAN bus using an open-source toolkit. Explore CAN basics, attack methods, hardware/software tools, diagnostic protocols, and security implications for modern vehicles.
Essential insights for effective incident response, covering crucial aspects often overlooked by beginners. Learn from real-world experiences to enhance your preparedness and decision-making during critical cybersecurity events.
Explore nation-state techniques for breaching air-gapped networks, analyzing similarities across frameworks and providing practical advice to enhance security and detect potential attacks.
Hands-on workshop exploring real-world cryptographic vulnerabilities. Implement attacks using provided tools, gaining practical experience in identifying and understanding common cryptographic weaknesses.
Explore diverse malware implementations within techniques, analyze tool differences, and learn to build resilient detection rules by modeling procedures and evaluating similarities.
Explore the factors that prevented Anonymous from being labeled as cyberterrorists, despite their global political activism and masked identity. Gain insights into the complex dynamics of digital activism and cybersecurity rhetoric.
Explore vulnerabilities in IoT devices for children, including baby monitors and GPS trackers. Learn research techniques like mobile reverse engineering and network analysis to enhance IoT security.
Discover creative hacking techniques to overcome pentesting challenges. Learn RFID cloning, universal access cards, key theft methods, and advanced phishing strategies for unconventional target compromise.
Get personalized course recommendations, track subjects and courses with reminders, and more.