Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cost-effective Red Team tactics using a covert disposable phone for reconnaissance, including device rooting, functionality, and anti-forensics techniques.
Explore flaws in machine learning for security evaluations, addressing experimental bias and proposing solutions for fair malware classifier comparisons in real-world settings.
Explore modern payment systems' security and privacy risks, comparing options like EMV, contactless, and mobile payments to help you make informed choices for safer transactions.
Explore tools and techniques used by cybercriminals on the dark web, from stolen credit cards to ransomware, and learn proactive defense strategies against various cyber threats.
Discover the art of social engineering for ethical hacking. Learn reconnaissance, disguise, pretext creation, and interaction techniques to infiltrate secure facilities while maintaining professionalism and ethics.
Explore IPFIX for efficient botnet traffic capture, reducing data volume by 97% and enhancing threat detection capabilities in network security.
Explore key issues in threat detection, including information sharing, SOC models, and tooling challenges. Learn practical solutions and real-world examples from Countercept's hunt team experiences.
Explore IoT device security vulnerabilities related to random number generation, their impact on cryptography, and potential solutions for embedded systems.
Explore advanced threat hunting techniques, datasets, and analytical approaches for effective cybersecurity. Learn to detect compromises missed by traditional methods and improve defensive strategies.
Explore anonymous authentication using linkable ring signatures, enabling spam prevention without compromising user privacy. Learn cryptographic principles and see a demo of an anti-spam anonymous forum on Tor/I2P.
Explore WiFi-based IMSI catchers, their potential for easier smartphone tracking, and learn about mitigation strategies for vendors, operators, and users to address privacy concerns.
Explore leakware, data breaches, and vulnerabilities. Learn to identify risks, share threat intelligence, and protect assets using OWASP Top Ten 2017. Discover real-world examples and strategies for improved cybersecurity.
Exploring TR-06FAIL and CPE vulnerabilities: impacts, related issues, and potential for mass router takeovers through TR-069 protocol implementations.
Exploring the evolving language of cybersecurity, its impact on communication, and the importance of effective terminology in reaching diverse audiences and promoting understanding.
Learn data-driven strategies to streamline network monitoring, reduce alert fatigue, and optimize your time. Discover tools and processes for effective business intelligence and dashboard creation.
Get personalized course recommendations, track subjects and courses with reminders, and more.