Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how library science principles can enhance information security practices, improving data organization, retrieval, and overall cybersecurity effectiveness.
Explore Proving Ground, a powerful OSINT tool, and learn its methodology, benchmarks, and limitations compared to other tools in this comprehensive overview.
Explore techniques for bypassing security measures and penetrating systems, focusing on practical strategies and real-world applications in cybersecurity.
Explore techniques for backdooring MS Office documents using secret master keys, uncovering potential vulnerabilities and security risks in widely-used productivity software.
Explore security vulnerabilities, consumer protection laws, and IoT's impact on legal frameworks. Gain insights into evolving cybersecurity challenges and their legal implications.
Explore airline revenue management tactics, ticketing systems, and industry vulnerabilities. Gain insights into pricing strategies and fare structures to find travel deals and outsmart the system.
Explore CAN Bus technology in aviation, its components, and data access methods. Learn about Aviation Village and Vehicle Spy for enhanced understanding of aircraft systems.
Explore the flaws in password surveys and their impact on security practices. Learn about better approaches to assess and improve password policies.
Explore advanced observability techniques for enhanced security and privacy, moving beyond traditional logs and time series data to improve threat detection and investigation.
Explore cyber hygiene services, software bill of materials, and sector-specific advice for resource-constrained organizations. Learn about challenges and solutions in cybersecurity for critical infrastructure.
Discover strategies for gaining and showcasing penetration testing experience, overcoming imposter syndrome, and navigating HR in the cybersecurity field.
Explore Chinese APTs' tactics in software supply chain attacks, examining notable incidents, code breakdowns, and open-source vulnerabilities to understand and mitigate these sophisticated threats.
Learn strategies to effectively communicate cybersecurity risks and initiatives to executives, enabling better decision-making and business alignment in the digital age.
Explore logic-based vulnerabilities in major platforms, focusing on duplicates and business logic flaws. Learn techniques to identify and exploit these weaknesses through real-world case studies.
Explore effective communication strategies in cybersecurity, addressing business impacts, vulnerabilities, and solutions for various threats including phishing, insider risks, and ransomware attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.