Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Digital Marketing
Graphic Design
Marketing Innovative Products and Services
Matrix Algebra for Engineers
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore aviation security challenges, from GPS jamming to in-flight entertainment vulnerabilities. Learn about digital systems, avionics, and ongoing efforts to enhance airplane cybersecurity.
Explore Cal Poly's innovative cybersecurity initiatives, including forensics training for law enforcement and interdisciplinary research projects at the California Cyber Training Complex.
Explore lock mechanics, lockpicking techniques, and security vulnerabilities. Learn about various lock types and methods to enhance lock security through demonstrations and animations.
Explore major cryptographic failures, including RC4 vulnerabilities, cross-protocol attacks, and the Heartbleed bug, with insights on encryption methods and security protocols.
Explore WiFi security types, their strengths, and vulnerabilities. Learn about WEP, WPA, WPA2, and enterprise-level security measures for protecting your wireless network.
Explore virtualization types, strengths, and threats. Learn AWS strategies and gain insights into copy-on-write tradeoffs and mobile device virtualization.
Explore IMSI Catchers: cell phone communication interceptors. Learn about their history, uses, detection methods, and legal implications. Discover an open-source app for identifying these devices.
Explore AI's current state, future potential, and ethical concerns. Delve into self-improving programs, machine empathy, and thought experiments like the Chinese Room.
Explore Bitcoin's inner workings, from blockchain and mining to wallet automation and real-world applications, in this comprehensive overview of cryptocurrency fundamentals.
Explore cyber-physical security, including system models, attack examples, and modern contexts. Learn about securing critical infrastructure and emerging challenges in networked control systems.
Explore virtual Capture The Flag challenges, learn exploitation techniques, and prepare for upcoming team-based Attack/Defense events in the Security Lab with CTF expert Drew Miller.
Learn ethical hacking essentials: security concepts, historical ciphers, social engineering, steganography, and crypto vulnerabilities from White Hat experts.
Explore cutting-edge Elliptic Curve Cryptography: its machinery, applications, and advantages over traditional encryption methods like RSA. Gain insights into this innovative technology revolutionizing data security.
Explore compiler internals, optimization techniques, and security enhancements to improve code efficiency and write better programs.
Explore data security fundamentals, cryptographic tools, and password protection techniques with White Hat VP Peter Faiman in this comprehensive overview.
Get personalized course recommendations, track subjects and courses with reminders, and more.