Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore CI/CD pipeline vulnerabilities in cloud environments, examining real-world examples of security risks and exploitation techniques in GitHub, CircleCI, and Jenkins.
Uncover hidden behaviors in your applications, including unexpected file operations and network connections, even when using trusted dependencies. Learn to identify and manage these covert activities.
Explore detection strategies for credential abuse, including core concepts, patterns, and challenges. Learn to identify suspicious activity and protect systems from unauthorized access.
Explore Internet ephemerality through hourly scans, revealing insights on service stability across ports, protocols, and ASNs. Implications for research and future scanning methodologies discussed.
Optimize your interview performance by understanding behavioral interviewing techniques, question selection, and evaluation methods. Learn strategies to leave a lasting impression and stand out as a top candidate.
Discover how Nix and Nix Flakes revolutionize software development by ensuring consistent, secure, and reproducible environments. Learn to streamline workflows, mitigate vulnerabilities, and enhance team collaboration.
Explore the critical impact of cyberattacks on healthcare, examining recent incidents and their consequences. Learn about policy and technical security measures to enhance resilience in the healthcare system.
Explore adversarial attacks on ML systems, AI jailbreaks, and their impact on popular AI models. Gain insights into cybersecurity risks and preparedness strategies in the rapidly evolving AI landscape.
Weaponizing Ethernet frames for stealthy communication, bypassing common detections and extending layer 2 range limitations. Explore innovative data encoding techniques on the Data Link Layer.
Explore vulnerabilities in US water systems, recent cyber attacks, and potential consequences. Discuss strategies to strengthen defenses against accidents and adversaries in critical infrastructure.
Explore vulnerabilities in ML pipelines through input-handling bugs, introducing incubated ML exploits and backdoors. Learn about security implications and guidelines for ML practitioners.
Insider tips and tricks to hack the job search process, build a standout profile, establish a personal brand, and ace interviews. Advance your career with proactive application strategies.
Explore Instacart's AI-powered just-in-time access system, balancing employee needs with security controls. Learn to leverage LLMs for automating workflows and enhancing internal security tooling.
Explore Bluetooth landscape using Linux D-Bus, covering protocol basics, toolsets, and device investigations. Learn scanning, discovery, and interaction techniques with Python, BlueZ, and dbus library.
Explore digital banking security, fraud prevention, and user protection in Scandinavian banks. Uncover limitations and challenges in addressing financial abuse and inequality.
Get personalized course recommendations, track subjects and courses with reminders, and more.