Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore real-world cloud security vulnerabilities, their root causes, and effective mitigation strategies through examples and demonstrations. Learn to protect your cloud systems from potential threats.
Explore the hidden world of cybercriminal travel services, uncovering underground agencies, fraud schemes, and vulnerabilities in the hospitality industry.
Explore insider threats and vulnerabilities in network domains, revealing how standard users can potentially gain full admin access and compromise security within organizations.
Explore drone security vulnerabilities, hacking techniques, and GPS spoofing methods. Learn about UK drone laws and differences between private and military drones.
Explore tools and techniques for identifying vulnerabilities in embedded devices and IoT, covering common attack vectors, responsible disclosure, and the overlap with OT/ICS security challenges.
Exploiting HTTP chunked transfer encoding to bypass egress filtering, enabling faster web shells and network pivoting during red team engagements.
Explore how e-cigarettes can be transformed into covert exploit platforms, including firmware decryption, custom functionality, and system penetration techniques.
Explore the consequences of open-source malware deployment, analyze attacker toolkits, and learn about defender opportunities in this insightful cybersecurity talk.
Discover Pi-Key: a £20 Raspberry Pi Zero device that steals Windows credentials, cracks them, and unlocks machines in under 60 seconds. Learn how it works, its components, and build your own.
Explore iOS malware's reality, recent discoveries, and implications for mobile security in this eye-opening talk challenging common perceptions about Apple device vulnerabilities.
Explore OSTrICa, an open-source framework for automated threat intelligence collection and visualization. Learn about its plugin-oriented architecture and applications in cybersecurity and incident response.
Explore LoRa security: limitations, attacks, and defensive strategies for smart city and IoT networks. Learn to build secure LoRa solutions for industrial and domestic applications.
Explore mischievous network devices and pranks using household electronics, including tales of international mishaps and Wi-Fi shenanigans.
Explore open-source malware analysis tools and techniques for file, URL, network traffic, and memory image analysis. Learn to build an automated analysis lab by chaining tools together.
Explores zero-day vulnerabilities in OEM Android customizations, demonstrating how these modifications can undermine Google's security measures and affect millions of devices worldwide.
Get personalized course recommendations, track subjects and courses with reminders, and more.