Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
UK's National Cyber Security Centre's approach to national-scale cybersecurity: evidence-based interventions, data-driven decisions, and innovative strategies to reduce attacks and their impact.
Exploring innovative approaches to engage with startups for cost-effective, efficient security solutions. Case study from Uber's engineering team demonstrates benefits for both companies and the broader market.
Exploring software engineering techniques to improve technology legislation, focusing on component-based architecture and modeling to create more effective and consistent laws.
Explore bulletproof and anonymous hosting providers' role in cybercrime, focusing on The Netherlands as a case study. Learn about threat detection, jurisdictional challenges, and potential solutions.
Explore DARPA's cybersecurity perspective, including current threats, attack anatomy, and innovative R&D efforts to combat sophisticated cyber challenges and enhance system security.
Explores DoD's shift towards open security practices, including bug bounties and vulnerability disclosure policies, highlighting progress and implications for researchers and prosecutors.
Explores security challenges of internet voting, revealing vulnerabilities in existing systems and discussing potential risks to election integrity, privacy, and public trust in digital voting methods.
Explore the intricacies of organizing Capture the Flag hacking competitions, from team building to contest design, and learn about the unique challenges and strategies involved in creating engaging cybersecurity events.
Exploring data integrity attacks in investigative domains, showcasing real-world cases and strategies to defend against misinformation and manipulation in big data analytics.
Explore challenges in web encryption through real-world horror stories from Let's Encrypt and HTTPS Everywhere projects, offering insights into staying secure in a complex digital landscape.
Insights on building effective competitive hacking teams, focusing on Capture the Flag contests. Learn strategies for team formation, skill development, and maximizing participation in cybersecurity challenges.
Explore the complex journey of web data beyond HTTPS, examining modern web infrastructure, security indicators, and potential approaches to extend trust beyond initial encryption.
Análisis de estafas de reenvÃo de paquetes: cómo los cibercriminales monetizan tarjetas robadas mediante reclutamiento de intermediarios inocentes para reenviar productos comprados fraudulentamente al extranjero.
Explore cybercrime cashout strategies, tools, and techniques. Gain insights into e-launderers' methods and learn effective defense tactics against financially motivated cyberattacks.
Explore firmware security, attack surfaces, and defense strategies. Learn to detect vulnerabilities, monitor integrity, and implement deep systems defense for enterprise protection against hardware and firmware attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.