Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from ShmooCon. Dive deep into the latest insights, research, and trends from the world's leading experts.
Panel discussion on key cybersecurity policy issues in 2020, featuring experts from government, advocacy, and legal sectors. Covers election security, legislation, research exemptions, and ways for security professionals to engage in policy-making.
Uncover the journey of a critical Zoom vulnerability, from discovery to disclosure, and its far-reaching implications for software security and responsible reporting practices.
Interactive ransomware response simulation based on real cases. Audience-driven decisions guide the incident response journey, exploring various scenarios, threat actors, and unexpected twists in cybersecurity.
Explore the financial impact of data breaches on public companies through stock price analysis, examining trends and predictive models to understand the true cost of security shortfalls.
Explore anti-forensics techniques to protect your privacy from various threat levels, from casual snooping to nation-state surveillance. Learn practical methods to safeguard your digital footprint.
Explore the intersection of law, technology, and warfare in cyberspace through a musical analogy. Learn how states evaluate cyber operations and determine responses under international law.
Explore IPv6 security implications, including enumeration techniques, statistical models for host discovery, and honeypotting methods. Learn about IPv6 exposure compared to IPv4 and access open-source scanning software.
Learn about creating and selling Solo, an open-source security key implementing U2F and FIDO2 protocols. Explore hardware design, crowdfunding, production challenges, and the benefits of open-source security devices.
Explore secure key rotation for cloud storage encryption, addressing current vulnerabilities and introducing new schemes with improved security and performance trade-offs.
Explore iPhone component removal to enhance privacy, balancing functionality loss. Learn about device resilience, sensor impacts, and practical steps for those seeking stronger data collection protection.
Explore unconventional data fusion techniques to analyze social networks, revealing insights from digital footprints and real-world sensors. Learn about graph theory and its applications in personal data analysis.
Explore cybersecurity topics and careers in an after-school program for high school students. Earn college credit while engaging in hands-on activities and learning from experienced professors.
Exploring machine learning's potential to predict mental health from social media posts, discussing privacy implications, language patterns, and mitigation strategies for ethical implementation.
Uncover the mysteries of IMSI catchers, their functionality, detection methods, and legal implications. Gain insights into cellular network fundamentals and cutting-edge research on unauthorized cell sites.
Operationalizing 24/7 cyber threat intelligence: techniques, training methodologies, and lessons learned for leveraging SOC Analysts, implementing with existing tools, budget, and experience.
Get personalized course recommendations, track subjects and courses with reminders, and more.