Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore Azure Log Analytics exploitation as a covert channel, uncovering potential security threats in cloud logging infrastructure and learning mitigation strategies.
Explore a platform for automated code scanning and vulnerability data streaming, designed to provide developers with fast, timely information on potential security issues.
Comprehensive guide to adversary simulations in GCP, covering initial access, persistence, privilege escalation, C2 using Google products, and data exfiltration techniques.
Explore ransomware's evolution, attack methods, and defense strategies. Learn to sharpen your cybersecurity skills against this persistent threat through real-world examples and practical mitigation techniques.
Learn how Ginger achieved HITRUST certification efficiently, saving time and money. Discover strategies for streamlined compliance, including self-assessment, program integration, and leveraging existing controls.
Explore war stories and learn to build secure infrastructure access systems. Analyze classic incidents and discover why the industry's "zero-trust" definition may be flawed.
Comprehensive overview of XSS attacks and modern defense strategies, covering browser-based, server-side, and framework-specific mitigations for web developers and security professionals.
Explore threat hunting using MITRE ATT&CK framework against Carbanak malware, covering tactics, techniques, and procedures for effective cybersecurity defense and mitigation strategies.
Explore common pitfalls and solutions for integrating security scanning into CI/CD pipelines, learning from real-world experiences and best practices.
Explore AWS attack techniques and build effective cloud defenses using the ATT&CK framework. Learn to create and operationalize detections for enhanced AWS infrastructure security.
Explore graph-based security analytics with Grapl, leveraging Python for powerful attack detection, behavior analysis, and streamlined investigations in complex environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.