Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore secure authentication methods, including tokens, OAuth, and SAML. Learn best practices, common issues, and key takeaways for implementing robust authentication in your systems.
Explore machine learning techniques for sandbox detection, feature selection, and model deployment in cybersecurity. Gain insights on client-side models and data acquisition strategies.
Standardize and scale vulnerability risk analysis using CVSS, NVD, and CVEs. Learn to effectively assess and communicate security risks across stakeholders with practical examples and visualizations.
Explore cyber intelligence techniques, from malware analysis to hacker mindset, with real-world examples and practical skills for navigating the digital frontier.
Explore how a rebel alliance shifts Pentagon culture to enhance national security through innovative hacking, data science, and digital transformation strategies.
Explore game theory's application in cybersecurity, focusing on strategic defense, resource allocation, and unpredictability to gain advantages against adversaries.
Explore SOC strategies using the ATT&CK framework to enhance threat detection, track progress, and improve security metrics for effective cybersecurity management.
Explore password security derived from African languages, analyzing data collection, conversion methods, and vulnerabilities to enhance cybersecurity practices.
Practical guide for hackers transitioning to leadership roles, covering key differences between leaders and managers, essential soft skills, and strategies for effective team management.
Explore Docker container escape techniques through live demonstrations, covering reconnaissance, exploiting vulnerabilities, and gaining system access. Learn practical cybersecurity skills for container environments.
Explore machine learning techniques for detecting phishing attacks, focusing on email and website classification, data collection, and modeling strategies to enhance cybersecurity.
Explore techniques for breaking encrypted bank statements, including JavaScript and RC4 analysis, with practical demonstrations and insights on difficulty levels and methodologies.
Explore fundamentals of security data science, including metrics, antiforensics, parsing challenges, and managing experiments. Learn to apply Occam's Razor and handle adversarial model decay.
Uncover hidden data access issues in Salesforce instances and learn strategies for effective data governance, security, and management to protect sensitive information.
Learn to create custom, affordable hardware for practical or aesthetic purposes, exploring circuit design fundamentals and PCB manufacturing techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.