Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to detect and disrupt malicious network traffic using egress proxies. Discover techniques to ensure trusted outbound connections and protect against external threats and data exfiltration.
Explore the evolving landscape of cybersecurity policy, its impact on the industry, and opportunities for hackers to influence regulations. Learn about global trends, case studies, and tools for effective policy engagement.
Learn to prevent accidental secret commits using Git hooks, enhancing code security and safeguarding sensitive information before it reaches remote repositories.
Insights on reducing bias in security hiring and maximizing interviews for various roles, drawing from a decade of global experience across major tech companies and startups.
Discover how gamification of security best practices can enhance engineering culture and improve security observability, based on Chime's successful implementation strategy.
Explore Pinterest's innovative approach to secure authentication using mTLS, device health attestation, and a custom identity provider for password-less access and enhanced security.
Discover how to protect local organizations from cyber threats through volunteer efforts and become a community cyber hero.
Discover untold stories, innovative bypasses, and social engineering techniques from 7 years of physical penetration testing. Gain insights into defeating security measures through real-world examples.
Explore Azure Log Analytics exploitation as a covert channel, uncovering potential security threats in cloud logging infrastructure and learning mitigation strategies.
Explore a platform for automated code scanning and vulnerability data streaming, designed to provide developers with fast, timely information on potential security issues.
Comprehensive guide to adversary simulations in GCP, covering initial access, persistence, privilege escalation, C2 using Google products, and data exfiltration techniques.
Explore ransomware's evolution, attack methods, and defense strategies. Learn to sharpen your cybersecurity skills against this persistent threat through real-world examples and practical mitigation techniques.
Learn how Ginger achieved HITRUST certification efficiently, saving time and money. Discover strategies for streamlined compliance, including self-assessment, program integration, and leveraging existing controls.
Explore war stories and learn to build secure infrastructure access systems. Analyze classic incidents and discover why the industry's "zero-trust" definition may be flawed.
Comprehensive overview of XSS attacks and modern defense strategies, covering browser-based, server-side, and framework-specific mitigations for web developers and security professionals.
Get personalized course recommendations, track subjects and courses with reminders, and more.