Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cognitive biases, memory illusions, and human factors affecting security and risk assessment. Gain insights to improve decision-making and strengthen organizational security practices.
Explore Hadoop vulnerabilities and security risks with expert insights on identifying and mitigating threats in big data environments.
Learn advanced wireless hacking techniques to bypass access controls and pivot through networks using indirect wireless methods.
Explore vulnerabilities in adult mobile apps and learn techniques for ethical hacking and security testing of sensitive applications.
Explore techniques for extracting and interpreting insights from deep neural networks, enhancing understanding and improving model performance in machine learning applications.
Learn techniques for escalating privileges to administrator level in recent Windows versions, including Microsoft Bounty Program insights and live demonstrations.
Explore the realities of a public service career with insights on challenges, rewards, and impact. Gain valuable perspectives on making a difference through government work.
Explore the role of a Product Security Incident Response Manager, covering user reports, vulnerability handling, and coordinated disclosure challenges in cybersecurity.
Explore hidden Cold War lessons on flawed learning models, data integrity attacks, and AI's future. Gain insights on intelligence as a weapon and cognitive blindness in modern conflicts.
Explore the evolution of destructive malware in geopolitical conflicts, analyzing key attacks and their impact on interstate rivalries and future cybersecurity challenges.
Advanced techniques for password cracking, exploring methods beyond basic approaches. Enhance your cybersecurity skills and learn to identify vulnerabilities in password systems.
Explore legal and ethical aspects of cybersecurity, including international laws, information sharing, and active defense strategies. Gain insights on balancing security with policy considerations.
Explore network forensics in encrypted environments, focusing on metadata analysis, hunting techniques, and leveraging encryption for defense. Learn to adapt and thrive in modern cybersecurity landscapes.
Comprehensive guide for security professionals on safeguarding Windows credentials, covering architecture, isolation, exploit mitigation, and containment strategies for enhanced system protection.
Explore password security beyond entropy, challenging conventional wisdom and offering insights on effective strategies for creating and managing strong passwords.
Get personalized course recommendations, track subjects and courses with reminders, and more.