Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to leverage GenAI and Docker for streamlined offensive security operations and automated hacking workflows in this practical cybersecurity presentation.
Discover how to build and configure your own homelab environment for hands-on cybersecurity learning and experimentation at home.
Discover how to exploit security professionals using Flipper Zero devices and evil portal techniques to demonstrate training limitations in cybersecurity awareness.
Discover no-code automation tools and their security implications through real-world examples and potential vulnerabilities in modern workflow systems.
Discover how AI transforms cybersecurity through practical applications, threat detection, and defense strategies in this comprehensive crash course.
Explore physical security fundamentals by examining lock mechanisms and their common vulnerabilities through hands-on analysis and exposure techniques.
Discover how AI agents enhance vulnerability analysis and remediation processes to strengthen cybersecurity defenses and streamline threat response workflows.
Discover how Identity and Access Management components integrate to create secure authentication and authorization systems in enterprise environments.
Discover how to build effective cybersecurity detection systems using free tools and engineering principles to identify threats and strengthen your security posture.
Discover practical encryption strategies for infrastructure security that balance protection with operational efficiency and management approval.
Discover detection techniques and evasion methods for Configuration Manager attack vectors in this cybersecurity-focused presentation.
Explore the psychological and social consequences of cyber attacks on individuals and communities, moving beyond traditional financial metrics to understand the true human impact.
Uncover how cybercriminals monetize stolen personal data through info stealer malware and the underground economy that profits from your information.
Discover essential strategies to safeguard children from online predators across popular gaming platforms like Roblox, Minecraft, and Discord through practical security measures.
Discover how to build effective security tabletop exercises and align teams through practical lessons from real-world implementation experience.
Get personalized course recommendations, track subjects and courses with reminders, and more.