Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Strategies for managing human factors during security incidents, focusing on psychological responses, effective communication, and team leadership in high-stress situations.
Explore vulnerabilities in PLCs, learn discovery methods, and see how minor flaws can lead to device takeover. Gain insights into industrial control system security and potential exploits.
Explore space-based communications security, attack surfaces, and defensive strategies. Learn to build simple solutions for hacking satellite systems and protecting astroenterprise assets.
Learn to create a vendor review management process from scratch using simple tools like email and Google Forms, without expensive software or large teams.
Learn to extract value from threat intelligence by implementing Adversary Detection Pipelines. Explore attribution challenges, leverage TTPs, and enhance security operations through practical case studies and intelligence-driven strategies.
Explore building a home SIGINT platform, contributing to FOSS software like Kismet, and creating new hardware for signal capture. Learn from a threat intelligence expert's experiences and practical demonstrations.
Exploring machine learning limitations in computer security, this talk introduces a framework for understanding AI problem-solving and discusses privacy implications of large datasets.
Explore cybersecurity challenges in elections, including disinformation, voting machine vulnerabilities, and election manipulation. Experts discuss threats, solutions, and the role of hackers in building voter trust.
Explore iOS app privacy scoring using network traffic analysis. Learn about data transmission, privacy factors, and challenges in monitoring private information flow on mobile devices.
Explore automated coverage analysis for efficient fuzzing, using bncov plugin for Binary Ninja to identify prime fuzz targets and uncover hidden vulnerabilities in software.
Insightful panel discussion featuring cybersecurity experts sharing career journeys, industry perspectives, and contemporary security topics, interspersed with lighthearted games and irreverent humor.
A satirical exploration of information warfare, covering Russian tactics like maskirovka and disinformation. Uses humor to raise awareness about technology engagement and cybersecurity challenges in the Information Age.
Explore facial recognition technology's widespread use, potential risks, and regulatory concerns. Learn about error rates, privacy issues, and strategies to responsibly implement this technology in various applications.
Detailed exploration of extracting ELF files from ESP32 firmware images, covering binary format analysis, conversion processes, and tools for reverse engineering IoT device firmware.
Crash course on Section 230: its purpose, function, and importance for online content. Learn why this law is crucial for protecting internet freedom and innovation from a legal expert.
Get personalized course recommendations, track subjects and courses with reminders, and more.