Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover modern techniques for local privilege escalation in internal networks, exploring alternative methods beyond traditional approaches for effective lateral movement and access elevation.
Dive into advanced Linux-targeted cyber threats, examining Lazarus Group's AppleJeus campaign, DTrack malware evolution, and emerging cryptocurrency theft tactics in modern cybersecurity.
Explore context-based security approaches for cloud native applications, understanding what's needed to protect modern containerized environments effectively.
Discover the fundamentals of Minecraft hacking, from server scanning to network proxies and Fabric, in this beginner-friendly introduction to game exploitation techniques.
Discover 5 simple but interesting bugs and lessons learned from a beginner's first year in bug bounty hunting, earning $0-16k and finding CVEs.
Delve into an analysis of disrupted Ukrainian bot farm operations, exploring security vulnerabilities, attack methodologies, and real-world implications for industrial control systems.
Explore the hidden security implications of UPnP and network convenience features through an expert analysis of default configurations and their potential risks in modern networks.
Discover how to build a personal "Pocket Threat Model" to identify and reduce security risks for your devices, accounts, and personal information, starting with basics and expanding to assess threats and countermeasures.
Explore the vulnerabilities in power system applications and their potential impact on critical infrastructure. Learn how attackers can compromise these systems and gain control over power stations during this BSidesBUD2023 presentation.
Dive into real-world cyber attack scenarios and defense strategies, exploring adversary tactics, stealth techniques, and effective detection methods for enhanced security operations.
Discover effective techniques for detecting cyber threats in OT environments using Windows-compatible batch scripts, focusing on methods that work across legacy and modern systems without compromising operations.
Delve into the mechanics and exploitation of the critical GLIBC heap overflow vulnerability (CVE-2023-6246), exploring privilege escalation techniques and practical heap overflow concepts.
Discover how eBPF revolutionizes Runtime Application Security, addressing long-standing challenges in performance, maintenance, and implementation effectiveness for modern security solutions.
Discover how to exploit Modbus protocol vulnerabilities in industrial systems through live demonstrations of Man-in-the-Middle attacks, data dumping, and PLC DoS using Python scripts on real hardware.
Discover 10 unique macOS persistence techniques, from common admin methods to lesser-known approaches, with practical detection strategies for IT security professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.