Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Explore Proving Ground, a powerful OSINT tool, and learn its methodology, benchmarks, and limitations compared to other tools in this comprehensive overview.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore how library science principles can enhance information security practices, improving data organization, retrieval, and overall cybersecurity effectiveness.
Discover advanced OSINT techniques for social media intelligence gathering, focusing on efficient methods to extract valuable information from online platforms.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Explore security vulnerabilities, consumer protection laws, and IoT's impact on legal frameworks. Gain insights into evolving cybersecurity challenges and their legal implications.
Explore techniques for backdooring MS Office documents using secret master keys, uncovering potential vulnerabilities and security risks in widely-used productivity software.
Explore the evolution of hacking and un-hacking a logic game over two decades, culminating in insights about the popular puzzle Lights Out.
Explore password security threats, attack methods, and protective measures. Learn about database breaches, cracking techniques, and strategies for rapid detection and response.
Explore collective action challenges in cybersecurity with Allan Friedman, examining strategies for coordinated responses to threats and vulnerabilities in the digital landscape.
Practical countersurveillance techniques to protect privacy and security in the digital age, empowering individuals against surveillance threats.
Explore the integration of Agile methodologies and security practices, addressing challenges and proposing solutions for effective implementation in software development.
Explore automated malware simulation tools for testing network defenses, including architecture, implementation, and future plans for enhancing security assessments.
Get personalized course recommendations, track subjects and courses with reminders, and more.