Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to combat vulnerability fatigue using data analytics principles from the US Tsunami Warning Center for real-time, high-impact security alerts.
Explore modern application security approaches combining defense, offense, automation, and continuous learning for various app types, including zero trust, supply chain, and microservices.
Explore the intersection of security, politics, and tech neutrality, examining how these factors impact user protection and the evolving role of technology companies in society.
Explore common cryptographic vulnerabilities and learn practical exploitation techniques in this engaging talk on breaking crypto systems effectively.
Explore forensic evidence from the Mueller Report to understand network compromises, access methods, and defensive strategies for organizations.
Explore medical device security, protocols, and system architecture. Learn how attackers can exploit vulnerabilities to access patient information in healthcare settings.
Explore serverless osquery backend deployment, scalability challenges, and large-scale data processing for enhanced intrusion detection and endpoint management.
Explore the first cross-platform Cobalt Strike re-implementation, Vermilion Strike, targeting both Linux and Windows in real-world attacks. Learn about this significant malware discovery.
Explore JavaScript obfuscation techniques and learn a method for detecting packers to identify obfuscated files, crucial for understanding modern security threats.
Explore the development of Hermes, a Swift implant for macOS red teaming, integrated with Mythic C2 framework. Learn about its capabilities and detection methods using Apple's ESF.
Comprehensive overview of WireGuard: its implementation, protocol, cryptography, and comparison with other VPN solutions. Learn when and how to use this efficient end-to-end encryption tool.
Challenging elitism in cybersecurity, this talk advocates for inclusivity and rethinking entry barriers to address growing demand and burnout in the field.
Panel discussion exploring security-focused TikTok creators' experiences in bringing hacking awareness, humor, and community to a new audience, highlighting successes and challenges in this emerging frontier.
Insightful discussion on building and scaling top security teams, exploring strategies for talent attraction, retention, and overcoming challenges in the cybersecurity industry.
Explore "Webhook Boomerang flaws" and learn how to exploit SSRF vulnerabilities in API webhooks, potentially compromising cloud credentials despite security measures.
Get personalized course recommendations, track subjects and courses with reminders, and more.