Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover CISA's operational approach to cybersecurity as national security, exploring critical infrastructure protection strategies and collaborative defense methods.
Uncover critical NVIDIA Container Toolkit vulnerabilities that enable container escapes and compromise AI infrastructure across major cloud platforms.
Discover how AI agents autonomously analyze digital forensic timelines and hunt threats in massive log datasets, revolutionizing incident response efficiency.
Discover critical RCE vulnerabilities in HashiCorp Vault and CyberArk Conjur with live demonstrations of remote attacks on default configurations and learn detection/prevention methods.
Discover how to exploit synthesized hardware failures to bypass CPU security boundaries and achieve privilege escalation through software-only attacks.
Explore cybersecurity evolution from analog to AI era, examining global digital vulnerabilities, supply chain risks, and strategies for building resilient infrastructure systems.
Discover how to revolutionize command line security by combining anomaly detection with LLMs to reduce false positives and enhance malicious command classification accuracy.
Discover Google's FACADE AI system for detecting insider threats with 99.99% accuracy using contrastive learning and self-supervised ML on billions of daily events.
Explore advanced lateral movement techniques from Active Directory to Entra ID, bypassing authentication and MFA in hybrid environments with undocumented methods.
Discover how statistical analysis of DNS traffic enables precise device tracking and user fingerprinting across networks, plus learn defensive countermeasures.
Discover how researchers remotely compromised a 2020 Nissan Leaf, exploiting Bluetooth vulnerabilities to control critical vehicle functions like steering, locks, and wipers via internet.
Discover ScamSweeper, a novel framework for detecting Web3 scams on Ethereum using dynamic transaction graph analysis and structure-temporal random walks to unmask illicit accounts.
Discover how to investigate and respond to attacks on GenAI chatbots, including prompt injection incidents, using AI defense tooling and LLM guardrails for effective incident response.
Discover advanced techniques for mining Java deserialization vulnerabilities using bottom-up gadget search and dataflow-aided payload construction to identify zero-day exploits.
Discover how APT groups exploit Windows Sandbox for evasion, analyzing Earth Kasha's tactics and learning defensive countermeasures for threat hunting.
Get personalized course recommendations, track subjects and courses with reminders, and more.