Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Rethink detection and response metrics with a practical framework, new maturity model, and visual examples. Learn to measure capabilities effectively and tell a compelling story using micro-purple testing techniques.
Explore Active Directory domain persistence techniques, focusing on detection, triage, and recovery strategies. Learn to identify attacks, reclaim control, and enhance Windows Security event auditing.
Integrate a clear path to improved performance by advancing DevSecOps metrics. Learn to deconstruct core metrics for accelerated delivery and increased customer value.
Explore attacker strategies, real-world scenarios, and cost-effective measures to protect small businesses from cyber threats. Learn to engage employees through gamification for enhanced security.
Dissect an Iranian nation-state intrusion, gaining insights into adversarial tactics. Learn threat hunting techniques to uncover and counter sophisticated cyber attacks in your environment.
Explore network forensics of vacuum bots, uncovering security and privacy concerns. Learn step-by-step analysis of bot communication, authentication protocols, and potential vulnerabilities in smart home devices.
Deploy and exploit a Log4Shell vulnerability practice range in AWS using Terraform and Ansible. Learn to set up targets and understand the vulnerability's impact.
Explore ICS ransomware threats, analyze Conti chat logs, and gain insights into critical infrastructure vulnerabilities. Learn from a cybersecurity expert's perspective on assessing and mitigating cyber risks.
Discover how to leverage GenAI and Docker for streamlined offensive security operations and automated hacking workflows in this practical cybersecurity presentation.
Discover how to build and configure your own homelab environment for hands-on cybersecurity learning and experimentation at home.
Discover how to exploit security professionals using Flipper Zero devices and evil portal techniques to demonstrate training limitations in cybersecurity awareness.
Discover no-code automation tools and their security implications through real-world examples and potential vulnerabilities in modern workflow systems.
Discover how AI transforms cybersecurity through practical applications, threat detection, and defense strategies in this comprehensive crash course.
Explore physical security fundamentals by examining lock mechanisms and their common vulnerabilities through hands-on analysis and exposure techniques.
Discover how to build effective cybersecurity detection systems using free tools and engineering principles to identify threats and strengthen your security posture.
Get personalized course recommendations, track subjects and courses with reminders, and more.