Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore password hashing policies, their disclosure, and implications for security. Learn about password length, breaches, and rating systems for evaluating hashing practices across various platforms.
Explore innovative passphrase generation techniques focusing on cultural relevance, vocabulary assessment, and user-friendly approaches to enhance password security and memorability.
Explore Windows Subsystem for Linux: architecture, processes, system calls, and security implications. Learn about cross-process access and Linux-Windows interactions.
Automate Active Directory privilege escalation analysis using Bloodhound. Learn techniques for identifying and exploiting paths to Domain Admin access efficiently.
Learn effective strategies for baselining security logs and event data to identify anomalies, establish normal patterns, and enhance threat detection capabilities in your organization.
Explore innovative network security strategies, focusing on egress filtering to combat phishing, botnets, and ransomware. Learn practical implementation and potential drawbacks.
Learn advanced PowerShell techniques for endpoint threat hunting, including methodologies, tools, and analysis modules for detecting and investigating malware and suspicious activities.
Learn effective techniques for identifying and targeting high-value assets within corporate networks, focusing on practical strategies, network complexity, and data discovery methods.
Explore machine learning disasters, their consequences, and potential solutions in this thought-provoking keynote addressing ethical challenges and the need for responsible AI development.
Learn to build and implement data diodes for secure industrial control systems, covering hardware, software, workflows, and threat modeling.
Explore the complexities of password security, alternative authentication methods, and user-centric approaches to digital identity protection in this insightful cybersecurity talk.
Explore Windows 10 DFIR challenges, including WAAS, VSM, and memory analysis. Learn about new artifacts, encryption, and tools for effective digital forensics and information security.
Explore innovative strategies for optimizing machine learning in cybersecurity through reduction, reuse, and recycling of solutions, enhancing efficiency and effectiveness in threat detection and response.
Discover strategies for effectively training and mentoring new security engineers, fostering their growth and success in the rapidly evolving cybersecurity landscape.
Explore FIDO Security Keys and WebAuthn, understanding their importance in modern authentication. Learn about public key cryptography and its role in enhancing login security.
Get personalized course recommendations, track subjects and courses with reminders, and more.