Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the critical challenges and solutions for securing AI-generated code, featuring practical tools and research for building AI security engineering capabilities.
Discover how to leverage BloodHound from a red team perspective to identify and remediate critical Active Directory security flaws, with practical insights using the new ad-recon automation tool.
Explore essential security concepts for generative AI and LLMs, understanding both traditional cybersecurity approaches and emerging threats in this evolving technological landscape.
Master Windows System Monitor (Sysmon) for incident investigation, learning to track program execution, registry writes, and DNS queries to effectively trace threat actor activities and enhance system security.
Discover how to leverage Atomic Red Team for simulating cyber attacks, validating security controls, and improving SOC effectiveness through practical demonstrations and MITRE framework mapping.
Explore AI security challenges and opportunities with tech leader Elissa Shevinsky as she shares insights from her extensive experience in privacy, security, and cryptocurrency sectors.
Dive into container security fundamentals, lifecycle management, and enterprise-level best practices for securing containerized applications in modern development environments.
Discover practical strategies and tools for validating hardware and software integrity, minimizing supply chain risks, and implementing effective security measures across your technology stack.
Explore adversarial thinking techniques in cybersecurity using MITRE PRE-ATT&CK framework to prevent file and data leakage incidents through authentic defensive strategies.
Discover practical network security strategies and tools from a pentester's perspective to strengthen defenses and make attackers' work significantly more challenging and time-consuming.
Dive into the intricate relationship between Active Directory and DNS, exploring security implications, management strategies, and best practices for maintaining a robust directory service infrastructure.
Discover a flexible framework for coordinating incident response teams, improving support structures, and developing staff capabilities during security incidents.
Discover how to transform traditional Security Operations Centers into agile, next-generation entities capable of addressing modern cyber threats and future challenges through practical, actionable steps.
Dive into North Korean APT group Lazarus's cyber-kill chain tactics, examining their MagicRAT malware and attack strategies against global energy companies through detailed MITRE ATT&CK analysis.
Discover how to simplify cybersecurity approaches by avoiding tool overload and focusing on effective, streamlined solutions for better threat management and user experience in modern security programs.
Get personalized course recommendations, track subjects and courses with reminders, and more.