Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Strategies for creating effective security documentation that people will read and use. Covers identifying needs, iterative creation, and measuring success in technical writing.
Unveiling security risks in cloud workflow platforms: misconfigurations, credential exposure, data leakage, insecure coding, and containerized malware. Eye-opening research for IT professionals.
Discover how to treat security vulnerabilities as debt, moving beyond rigid SLAs and exception overload. Learn strategies for responsible risk management in cybersecurity.
Exploring the emerging threat of biohacking: how human implants can compromise contactless technology and pose risks to physical and digital security systems.
Discover innovative approaches to scale threat modeling programs without compromising quality. Learn strategies for efficient security practices that empower teams and enhance overall effectiveness.
Detailed walkthrough of a challenging Hacking/Reverse Engineering CTF challenge inspired by a Pokemon Red bug, with step-by-step instructions for setup and execution.
Explore advanced JavaScript techniques for network reconnaissance and exploitation, focusing on rapid execution and targeting internal vulnerabilities from external sources.
Explore Jython scripting in Ghidra for efficient malware analysis, using real-world examples to enhance reverse engineering techniques and streamline the process of analyzing obfuscated binaries.
Explore Dispatch, an automation tool for crisis management lifecycles, streamlining incident response from initial report to post-incident review.
Explore open source component risks and mitigation strategies, focusing on supply chain vulnerabilities, recent hacks, and preventive measures through education and automated tooling.
Strategies for career growth in cybersecurity: improving influence, visibility, and promotion chances through effective stakeholder management and asset tracking techniques.
Discover actionable strategies to dramatically enhance your company's security posture without significant financial investment. Learn from distilled insights and lessons from DevSecOps and modern AppSec experts.
Explore the modern 2FA landscape with data-driven analysis, comparing security strength and user experience of various authentication methods like SMS, soft tokens, push, and WebAuthn.
Practical advice for security professionals on improving technical writing skills, from starting to finishing, with tools and tips for presenting professional work.
Explore privacy challenges in ML/AI applications and learn about a framework that integrates data security with machine learning technologies to address potential nightmares.
Get personalized course recommendations, track subjects and courses with reminders, and more.