Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Communication Skills
Project Management
Graphic Design
Functional Programming Principles in Scala
Supporting Successful Learning in Primary School
Transport Systems: Global Issues and Future Innovations
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore RF security vulnerabilities, including replay attacks and jamming. Learn about SDRs, two-way communication, and biohacking implications in wireless systems beyond WiFi and Bluetooth.
Explore mobile app analytics tools, their data collection practices, and privacy implications. Learn techniques to identify session replay capabilities and device fingerprinting methods in iOS and Android apps.
Explore advanced PowerShell techniques, EDR evasion, and the evolving landscape of Windows endpoint security. Gain insights into offensive and defensive strategies for red teaming and threat emulation.
Explore cost-effective Red Team tactics using a covert disposable phone for reconnaissance, including device rooting, functionality, and anti-forensics techniques.
Explore flaws in machine learning for security evaluations, addressing experimental bias and proposing solutions for fair malware classifier comparisons in real-world settings.
Explore modern payment systems' security and privacy risks, comparing options like EMV, contactless, and mobile payments to help you make informed choices for safer transactions.
Explore tools and techniques used by cybercriminals on the dark web, from stolen credit cards to ransomware, and learn proactive defense strategies against various cyber threats.
Discover the art of social engineering for ethical hacking. Learn reconnaissance, disguise, pretext creation, and interaction techniques to infiltrate secure facilities while maintaining professionalism and ethics.
Explore IPFIX for efficient botnet traffic capture, reducing data volume by 97% and enhancing threat detection capabilities in network security.
Explore key issues in threat detection, including information sharing, SOC models, and tooling challenges. Learn practical solutions and real-world examples from Countercept's hunt team experiences.
Explore IoT device security vulnerabilities related to random number generation, their impact on cryptography, and potential solutions for embedded systems.
Explore advanced threat hunting techniques, datasets, and analytical approaches for effective cybersecurity. Learn to detect compromises missed by traditional methods and improve defensive strategies.
Explore anonymous authentication using linkable ring signatures, enabling spam prevention without compromising user privacy. Learn cryptographic principles and see a demo of an anti-spam anonymous forum on Tor/I2P.
Explore WiFi-based IMSI catchers, their potential for easier smartphone tracking, and learn about mitigation strategies for vendors, operators, and users to address privacy concerns.
Explore leakware, data breaches, and vulnerabilities. Learn to identify risks, share threat intelligence, and protect assets using OWASP Top Ten 2017. Discover real-world examples and strategies for improved cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.