Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore the new FIPS 140-3 cryptographic standard, its key differences from FIPS 140-2, and the transition timeline. Learn about updated requirements, terminology changes, and implications for current certifications.
Explore NPK, an open-source tool for high-powered hash cracking using AWS GPU instances. Learn its features, benefits, and how it enables cost-effective password security assessment.
Modernized domain squatting techniques for OSINT gathering and weaponized document delivery, exploring corporate relationships, supply chain mapping, and advanced spear-phishing attacks.
Explore vulnerabilities in popular password managers, focusing on security risks during different operational states and potential attack vectors for extracting sensitive information.
Explore how fostering a culture of cybersecurity awareness and leveraging human resilience can be your organization's strongest defense against evolving AI-powered cyber threats.
Explore supply chain risk management using Huawei as a case study. Experts discuss best practices for risk assessment, transparency, and securing networks in a global ecosystem.
Explore privacy challenges in the digital age, emerging technologies, regulatory landscape, and strategies for responsible data use. Learn to navigate evolving privacy norms and protect personal information.
Explore how a vulnerability in Amazon Echo led to the discovery of Kr00k, a widespread WiFi security flaw affecting billions of devices from major tech companies. Learn about its implications and potential risks.
Explore SCADA/ICS vulnerabilities, exploitation techniques, and simulated attacks on power grids. Learn about security challenges in industrial systems and strategies for improving defenses.
Dispelling hacker myths to enhance aviation cybersecurity through collaboration between government, industry, and ethical hackers for safer air travel.
Explore global encryption bans, their impact on privacy, security, and democracy. Analyze government policies, cybersecurity trends, and the privacy-preserving movement's response to these challenges.
Explore AI-powered behavioral forensics for cybercrime investigation, profiling hackers through their digital traces and connecting seemingly unrelated attacks using advanced analysis techniques.
Explore the sophisticated Monokle mobile surveillanceware, its deployment by nation-states, and its attribution to a Russian contractor. Learn about trends in advanced mobile surveillance technology development.
Comprehensive analysis of 5G security risks using threat modeling. Explores new technology components, services, and mitigating controls in the 5G ecosystem, with a focus on the World Bank Group's approach.
Exploring NYPD's strategy to combat cyber-enabled crimes, focusing on challenges, training, and victimology. Insights on scaling law enforcement responses and improving victim support.
Get personalized course recommendations, track subjects and courses with reminders, and more.