Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover the alarming spread of exposed API keys and secrets in public repositories. Learn about research findings, causes, and implications for cybersecurity.
Discover Marie Kondo-inspired techniques for managing security challenges efficiently. Learn about useful tools and lessons to avoid reinventing the wheel in under-resourced security teams.
Explore practical applications of machine learning in threat hunting and detection, featuring case studies of high-value detections from two years of research and implementation.
Discover strategies for security engineers to collaborate with product managers, enhancing security features, accelerating team growth, and unlocking revenue from security-conscious customers.
Strategies for creating effective security documentation that people will read and use. Covers identifying needs, iterative creation, and measuring success in technical writing.
Unveiling security risks in cloud workflow platforms: misconfigurations, credential exposure, data leakage, insecure coding, and containerized malware. Eye-opening research for IT professionals.
Discover how to treat security vulnerabilities as debt, moving beyond rigid SLAs and exception overload. Learn strategies for responsible risk management in cybersecurity.
Exploring the emerging threat of biohacking: how human implants can compromise contactless technology and pose risks to physical and digital security systems.
Discover innovative approaches to scale threat modeling programs without compromising quality. Learn strategies for efficient security practices that empower teams and enhance overall effectiveness.
Detailed walkthrough of a challenging Hacking/Reverse Engineering CTF challenge inspired by a Pokemon Red bug, with step-by-step instructions for setup and execution.
Explore advanced JavaScript techniques for network reconnaissance and exploitation, focusing on rapid execution and targeting internal vulnerabilities from external sources.
Explore software transparency through SBOMs, enhancing vulnerability management and supply chain visibility. Learn how this approach can revolutionize cybersecurity and software development practices.
Explore Jython scripting in Ghidra for efficient malware analysis, using real-world examples to enhance reverse engineering techniques and streamline the process of analyzing obfuscated binaries.
Explore Dispatch, an automation tool for crisis management lifecycles, streamlining incident response from initial report to post-incident review.
Explore efficient incident response using Osquery for digital forensics, accelerating breach investigations and uncovering attacker breadcrumbs in large-scale environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.