Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore SAP security patch management, addressing challenges and providing effective solutions for maintaining robust system protection.
Explore SAP Hana application vulnerabilities and security measures from a penetration tester's perspective. Learn effective hacking techniques and defensive strategies to enhance your SAP infrastructure's resilience.
Explore techniques for manipulating Windows trust mechanisms, including code signing and execution policies, to bypass security controls and elevate privileges.
Explore network monitoring techniques to enhance visibility in industrial control systems, overcoming host-level limitations for improved security and threat detection.
Explore vulnerabilities in SAP's Internet Graphics Server (IGS), a critical but often overlooked component. Learn about potential security risks and mitigation strategies.
Practical strategies for immediate cybersecurity improvements. Learn actionable steps to enhance your organization's defense posture and implement effective security measures.
Explore Active Directory security challenges and solutions with expert Sean Metcalf. Gain insights into vulnerabilities, attack vectors, and effective defense strategies for robust AD protection.
Learn to implement secure continuous delivery practices in just 60 minutes. Explore key concepts, tools, and strategies for integrating security into your development pipeline efficiently.
Explore NFC payment vulnerabilities through relay and replay attacks, uncovering potential security risks in contactless transactions.
Learn techniques for reverse engineering black box systems using GreatFET and Facedancer tools, presented by experts Dominic Spill and Kate Temkin at the TROOPERS18 conference.
Explore car hacking fundamentals, techniques, and potential vulnerabilities in modern vehicles. Learn about automotive security challenges and emerging threats in connected cars.
Explore the fascinating world of cloud seeding, its techniques, applications, and potential impacts on weather modification and climate control.
Uncover vulnerabilities in long-standing standards and explore their implications for IoT security in this eye-opening talk by Paul Meller.
Explore Windows 10 security enhancements with experts Evan Pena and Christopher Truncer, covering latest improvements and their impact on enterprise defense strategies.
Explore the transition from web pages to the Internet of Things, examining security implications and future challenges in connected devices and systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.