Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Microsoft Excel
Artificial Intelligence
An Introduction to Interactive Programming in Python (Part 1)
Excel: Fundamentos y herramientas
The Future of Work: Preparing for Disruption
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerability testing through a real-world case study, gaining insights into effective security assessment techniques and practical application of testing methodologies.
Explore techniques for exploiting vulnerabilities in TP-Link devices, uncovering potential security risks and learning ethical hacking practices for IoT devices.
Explore automotive ECU research fundamentals, including analysis techniques and security implications for modern vehicles' electronic control units.
Explore GREATFET hardware hacking with Rust programming, enhancing IoT security skills through hands-on experimentation and practical demonstrations.
Explore multicast DNS and DNS service recovery vulnerabilities through in-depth attack analysis, enhancing network security understanding and defense strategies.
Explore vulnerabilities in Cisco's Autonomic Network, uncovering potential security risks and attack vectors in next-generation networking infrastructure.
Explore RIPE Atlas, a global network measurement platform, to understand internet infrastructure, connectivity, and performance. Learn to create and analyze measurements for network insights.
Explore IoT device communication with gateways, focusing on security implications and potential vulnerabilities in data transmission and network protocols.
Explore the inner workings of modern 3G and 4G cellular modems, uncovering their architecture, security implications, and potential vulnerabilities in this in-depth technical analysis.
Explore cellular communication vulnerabilities and real-world case studies, uncovering potential security risks and practical mitigation strategies for IoT devices.
Explore radio hacking techniques and IoT security vulnerabilities with experts Matt Knight and Marc Newlin in this comprehensive conference talk on breaking wireless communication systems.
Explore IoT device vulnerabilities, hacking techniques, and forensic analysis in smart homes. Learn about zero-day exploits and their impact on home security.
Update on TROOPERS charity initiative Habibi Works, supporting refugees through IT education and empowerment. Explores impact, challenges, and future plans for this humanitarian tech project.
Engaging lightning talks on IT security topics by three experts, covering cutting-edge research and practical insights for professionals in the field.
Explore PHP internals and exploit development techniques in this advanced security talk, focusing on vulnerabilities and defensive strategies for web applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.