Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore effective metrics for communicating security insights to executives. Learn to present data visually, focus on business impact, and tell compelling stories that drive action and support.
Explore Kali Linux for identifying and exploiting common security vulnerabilities, including unnecessary services, weak passwords, and web-based admin interfaces.
Explore advanced password cracking techniques using hashcat, focusing on the NSAKEY vulnerability and its implications for system security.
Discover practical networking skills for real-world scenarios, focusing on RJ45 jacks and human-centric approaches to network troubleshooting and management.
Explore the intricacies of Trojan malware through an in-depth demonstration, uncovering its mechanisms, impacts, and potential defensive strategies.
Comprehensive guide on penetrating corporate networks, from external reconnaissance to internal server access, covering advanced techniques and security vulnerabilities.
Learn to build and manage a successful security conference from experienced organizers, covering planning, logistics, and community engagement strategies.
Explore how DevOps monitoring tools can enhance security visibility, providing insights to improve threat detection and response in IT environments.
Learn wireless pentesting techniques with easy-to-follow methods. Discover how to assess and secure Wi-Fi networks using practical, hands-on approaches suitable for beginners and experts alike.
Explore network flow data analysis techniques for enhanced threat detection and incident response in cybersecurity environments.
Explore information security through aviation analogies, discussing layers of protection, the cost of failure, and the importance of checklists in both fields.
Explore the flaws in password surveys and their impact on security practices. Learn about better approaches to assess and improve password policies.
Explore advanced observability techniques for enhanced security and privacy, moving beyond traditional logs and time series data to improve threat detection and investigation.
Explore cyber hygiene services, software bill of materials, and sector-specific advice for resource-constrained organizations. Learn about challenges and solutions in cybersecurity for critical infrastructure.
Discover strategies for gaining and showcasing penetration testing experience, overcoming imposter syndrome, and navigating HR in the cybersecurity field.
Get personalized course recommendations, track subjects and courses with reminders, and more.