Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn about Jak, a tool for securely sharing sensitive files through Git, including its features, demo, and lessons learned during development.
Explore techniques for bypassing access control systems using implantable logic analyzers, including methods for manipulating magnetic reed switches and passive infrared exit sensors.
Explore hardware hacking techniques like CT scanning and chip decapping for non-destructive device analysis, circuit reconstruction, and vulnerability identification in embedded systems and access control.
Explore LD_PRELOAD process injection, its audit system, and whitelisting challenges. Learn about built-in protection vs. bolt-on solutions for Linux security.
Explore 5G protocol vulnerabilities and exploits, analyzing real traffic captures to uncover potential security issues in pre-authentication messages and discuss implications for mobile network security.
Practical insights on implementing Zero Trust security in a cloud-based, remote work environment. Covers challenges, solutions, and lessons learned from real-world experience.
Explore Kubernetes security challenges, attack techniques, and practical advice for pentesters and security practitioners in containerized environments.
Explore legal and technological aspects of protecting digital privacy during border crossings, with insights on device security and traveler rights.
Detailed examination of critical 0-day vulnerabilities in Cisco SMB switches, including web application and API exploits, leading to complete endpoint compromise and data leakage.
Practical approach to threat modeling for prioritizing defenses. Learn to identify relevant adversaries, match them to your organization, and take action to improve security posture.
Explore SHAKEN/STIR, a new tech standard using public key cryptography to combat phone number spoofing and reduce spam calls, with insights on implementation challenges and interim solutions.
Explore hardware decompilation techniques to extract high-level functionality from integrated circuit netlists, drawing parallels with software decompilation for design recovery and hardware assurance.
Explore Project Everest's verified, high-performance secure communication components. Learn about F* programming, EverCrypt, EverParse, and EverQuic-transport, and their adoption in major projects.
Explore email address reputation analysis for identifying spear-phishing and fraud. Learn about EmailRep, a system using OSINT techniques to assess email risk and differentiate real users from attackers.
Panel discussion on key cybersecurity policy issues in 2020, featuring experts from government, advocacy, and legal sectors. Covers election security, legislation, research exemptions, and ways for security professionals to engage in policy-making.
Get personalized course recommendations, track subjects and courses with reminders, and more.