Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore risk management in security, challenging misconceptions and revealing its value. Learn to interpret, measure, and leverage risk effectively for better organizational outcomes.
Explore big data analysis for cybersecurity using Hadoop, tackling malware, network traffic, and log files at scale to overcome processing limitations and enhance threat detection.
Explore innovative approaches to security awareness training, focusing on social engineering techniques to create positive change and effective communication strategies for lasting impact.
Aprenda a evitar erros comuns na resposta a incidentes de segurança cibernética, com foco em preservação de evidências, análise de dados e estratégias eficazes de contenção.
Explore ARM exploitation, reverse engineering, and vulnerability analysis through the lens of hacking an internet-enabled rabbit toy, uncovering authentication bypasses and remote code execution bugs.
Explore bug bounty dynamics, structure, and benefits for both hunters and companies. Learn strategies for successful programs and navigating challenges in this evolving cybersecurity landscape.
Learn to transform your phone into a low-cost IMSI catcher detector. Explore mobile security vulnerabilities, silent SMS detection, and IMSI catcher identification techniques in this comprehensive tutorial.
Dive deep into Meterpreter's inner workings, exploring its lifecycle, Reflective DLL Injection, and migration techniques. Gain technical insights into this powerful Metasploit payload for Windows systems.
Explore creative problem-solving and repurposing through the lens of building a bionic hand from a coffee maker. Learn innovative approaches to finding potential in everyday objects.
Novel USB attacks for remote control of air-gapped machines with minimal forensic footprint. Explores stealthy bi-directional channels, remote connectivity, and offloading complexity to hardware. Releases open-source toolset using freely available hardwa…
Explore JTAG exploitation techniques for rooting devices, covering physical layer access, data protocols, and advanced memory analysis for security professionals.
Explore malware analysis techniques, from detection to eradication, using free tools. Learn to identify indicators of compromise and effectively remove threats from enterprise networks.
Explore Meterpreter's evolution, new features, and advanced techniques for red team engagements. Learn about stageless payloads, transport modification, and persistence to enhance network penetration capabilities.
Explore Windows drivers: IRPs, IRQLs, device objects, function handlers, I/O controls, and memory access. Gain practical insights for driver development and debugging.
Explore modern Man-In-The-Middle attack techniques with MITMf, a Python framework combining new and old methods for efficient, extendable, and reliable network security testing.
Get personalized course recommendations, track subjects and courses with reminders, and more.