Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into the hidden corners of the internet, exploring dark web forums, markets, and scams. Gain insights into this secretive digital underworld and its operations.
Discover advanced OSINT techniques for social media intelligence gathering, focusing on efficient methods to extract valuable information from online platforms.
Explore disinformation tactics, their impact, and automated propagation methods in this eye-opening talk on cybersecurity threats and their real-world consequences.
Explore apocalyptic scenarios driven by Fear, Uncertainty, and Doubt (FUD), examining potential threats from ecological attacks to nuclear facilities and future infrastructure.
Explore the world of Capture The Flag (CTF) competitions, learning key concepts, benefits, and strategies for success in cybersecurity challenges.
Discover how a small investment can expose major vulnerabilities in billion-dollar companies. Learn about red teaming, user enumeration, and password spraying techniques used by ethical hackers.
Practical guide to preparing organizations for cyber incidents, covering key processes, skilled personnel, logging, containment technology, and coordination tools for effective response.
Explore how shifting security left in development can lead to unexpected wins, improved processes, and better collaboration between security teams and developers.
Explore the journey of two aspiring hackers, from university life to professional roles, highlighting challenges, opportunities, and career development in cybersecurity.
Explore findings from a blue/red team security simulation focused on securing cloud delivery pipelines, with insights on tooling, advanced attackers, and best practices.
Explore advanced techniques for detecting credential attacks, reducing false positives in UEBA and NID tools, and improving overall cybersecurity defenses.
Explore the complexities of bug bounty programs, their effectiveness, and hidden challenges. Gain insights into hunter archetypes and the paradoxical nature of crowdsourced security testing.
Explore container exploitation and security in DevOps with BOtB tool. Learn to identify, exploit, and remediate vulnerabilities in Docker and LXC environments before production releases.
Explore RF security vulnerabilities, including replay attacks and jamming. Learn about SDRs, two-way communication, and biohacking implications in wireless systems beyond WiFi and Bluetooth.
Explore mobile app analytics tools, their data collection practices, and privacy implications. Learn techniques to identify session replay capabilities and device fingerprinting methods in iOS and Android apps.
Get personalized course recommendations, track subjects and courses with reminders, and more.