Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring TR-06FAIL and CPE vulnerabilities: impacts, related issues, and potential for mass router takeovers through TR-069 protocol implementations.
Explore the controversial topic of ransomware decriminalization, examining potential impacts, ethical considerations, and policy implications for cybersecurity and law enforcement.
Explore cloud security risks in Git repositories, focusing on common misconfigurations and best practices for protecting sensitive information in version control systems.
Learn to create a private AWS security training lab using SecDevOps-Cuse/CyberRange. Explore automation, vulnerability management, and offensive security in a safe cloud environment.
Explore the rise of spear phishing, learn to identify vulnerable targets through social media, and discover effective protection strategies for individuals and organizations.
Explore Magecart's evolution, tactics, and techniques in compromising e-commerce sites for credit card skimming. Learn about high-profile breaches and the criminal underworld behind this cybercrime phenomenon.
Explore libpcap for offensive security: bypass firewalls, intercept traffic, manipulate network connections, and evade detection. Hands-on techniques with source code provided.
Explore the fascinating takedown of major darknet markets, including AlphaBay and Hansa, in this talk on international law enforcement operations, deception, and cybercrime investigations.
Maximizing security awareness through a champions program: scaling up, improving communication, enhancing security cost-effectively, and boosting incident reporting. Aligning with company culture for effective implementation.
Humorous exploration of data protection practices, contrasting organizations' claims with real-world breaches. Offers insights on improving security measures while highlighting both progress and challenges.
Comparative analysis of AWS and Azure security features, exploring identity management, storage, encryption, network security, and monitoring capabilities in both cloud platforms.
Explore realistic attacker emulation using CALDERA, implementing techniques, modeling groups, and executing end-to-end attack paths to improve defenses and investigate new threats.
Explore advanced password cracking techniques, hash preprocessing tools, and best practices for secure hashing. Learn to prevent credential stuffing and analyze real-world password dumps.
Exploring trust issues in technology, focusing on DNS and HTTPS/TLS systems. Analyzes how security measures often fail to protect average users, proposing ways to improve online safety for all.
Explore the rapid evolution of technology, our growing dependence on digital devices, and the cybersecurity challenges that arise as connected devices proliferate.
Get personalized course recommendations, track subjects and courses with reminders, and more.