Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Mozilla's bug bounty program, its history, benefits, and challenges. Learn how to implement similar programs and their advantages over black market alternatives.
Explore innovative graphical password authentication, offering enhanced security and memorability compared to traditional alphanumeric methods. Learn implementation techniques and future possibilities.
Explore innovative attacks on USB data modems, including fuzzing techniques and SMS payload execution. Learn about vulnerabilities, reverse engineering, and USB sniffing for offensive security research.
Learn threat modeling basics, STRIDE model, and OWASP Threat Dragon in this interactive session. Gain practical skills to identify and mitigate security risks in software development.
Explore deploying security tools in challenging environments using Kubernetes for scalability and minimal customization. Learn a three-step plan and cloud setup process for inherited projects.
Learn strategies for secure migration from on-premise to Azure Cloud, focusing on real-time scenarios, architecture design considerations, and Azure services for seamless transition while addressing security challenges.
Cybersecurity experts discuss operationalizing threat intelligence, moving from reactive to proactive approaches, and addressing challenges in cloud adoption and workforce training for enhanced security.
Explore Android Runtime's evolution, optimization techniques, and structure. Learn to analyze apps by modifying ART to extract real-time information and develop effective analysis techniques without code access.
Explore Azure Sphere IoT security features, vulnerabilities discovered during Microsoft's research challenge, and a privilege escalation chain for acquiring Azure Sphere Capabilities.
Explore 5G telecom security challenges, improvements, and implementation issues. Learn about virtualization risks, DDOS threats, and industry initiatives like NESAS in this comprehensive overview.
Explore the evolution of security research and disclosure, from historical "unbreakable locks" to modern challenges in IoT, blockchain, and AI, with insights on ethical hacking and vulnerability reporting.
Explore vulnerabilities in macOS antivirus software through XPC exploitation, uncovering security flaws and providing guidance for developers to create secure XPC services.
Explore evolving enterprise security architecture beyond traditional layered defense, addressing modern challenges like advanced hacking, cloud adoption, and remote work to enhance organizational cybersecurity.
Comprehensive workshop on extracting data from damaged Android devices, covering soldering, retrieval of device information, and extraction of various data types for forensic analysis.
Explore machine learning for real-time intrusion detection in cybersecurity. Learn to build a system using AI techniques, featuring insights from Google's Lead Security Engineer Varun Kohli.
Get personalized course recommendations, track subjects and courses with reminders, and more.