Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Communication Skills
Data Analysis
Medicine and the Arts: Humanising Healthcare
Arab-Islamic History: From Tribes to Empires
The Bible's Prehistory, Purpose, and Political Future
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from ShmooCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Strategies for managing human factors during security incidents, focusing on psychological responses, effective communication, and team leadership in high-stress situations.
Explore vulnerabilities in PLCs, learn discovery methods, and see how minor flaws can lead to device takeover. Gain insights into industrial control system security and potential exploits.
Explore an ensemble deep learning model for real-time malware detection, combining CNN, LSTM, and NLP techniques to analyze domain names and identify potential threats with high accuracy.
Irreverent overview of key cybersecurity legal issues, covering privacy, security, hacking, digital rights, and data breaches. Highlights important cases and regulations with a focus on fundamental principles.
Comprehensive survey of evasive malware techniques, detection methods, and mitigation strategies over the past decade, exploring the ongoing battle between malicious actors and automated analysis systems.
Explore SSL certificate security, Certificate Transparency, and CertGraph tool for domain enumeration. Learn to protect your organization and uncover hidden information in SSL certificates.
Explore legal implications of biometric technology on civil rights, focusing on 4th and 5th Amendment protections. Learn design suggestions for mobile devices and tips for users.
Exploring the human side of cybersecurity through experiential learning projects, fostering multidisciplinary dialogue and developing qualitative research skills to understand adversarial mindsets and predict defender behavior.
Explore U2F Zero: secure hardware design, DIY production, and Amazon Prime sales. Learn about hardware acceleration, manufacturing challenges, and cost breakdown for this innovative security device.
Explore the complex world of ad fraud, from its early days to modern detection methods, verification processes, and the roles of various players in the advertising ecosystem.
Explore the complex relationship between metadata and content in digital communications, examining legal implications and technical intricacies of internet architecture and data collection.
Learn about Jak, a tool for securely sharing sensitive files through Git, including its features, demo, and lessons learned during development.
Explore techniques for bypassing access control systems using implantable logic analyzers, including methods for manipulating magnetic reed switches and passive infrared exit sensors.
Learn about creating and selling Solo, an open-source security key implementing U2F and FIDO2 protocols. Explore hardware design, crowdfunding, production challenges, and the benefits of open-source security devices.
Explore secure key rotation for cloud storage encryption, addressing current vulnerabilities and introducing new schemes with improved security and performance trade-offs.
Get personalized course recommendations, track subjects and courses with reminders, and more.