Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ByteSweep, a free IoT security analysis platform. Learn about artifact uploading, file extraction, data enrichment, and analysis techniques for identifying vulnerabilities in IoT devices.
Insightful panel discussion exploring diversity in cybersecurity, featuring personal stories and strategies to promote inclusion and retain women in the field.
Explore the impact of breached credentials on enterprises, learn about data leaks, and discover solutions for incident response and active directory management.
Explore a graph-based platform for enhanced cybersecurity detection and response, covering node relationships, log analysis, and advanced investigation techniques.
Explore AI safety, ethical considerations, and potential risks in bot development. Learn strategies for creating more secure and responsible AI systems.
Explore Active Directory vulnerabilities, attack techniques, and mitigation strategies in this comprehensive cybersecurity talk. Learn about reconnaissance, NTLM, Kerberos, and privilege escalation methods.
Explore user behavior on phishing sites through mouse and keyboard data analysis. Gain insights into decision-making patterns and learn effective strategies for enhancing cybersecurity awareness.
Discover strategies to fund your passion projects and reshape your career path. Learn about innovative funding sources and community networks to support your professional goals.
Explore cloud security essentials, from shared responsibility to logging, compliance, and incident response. Learn best practices for AWS, Azure, and Office 365 environments.
Explore the potential impact of deepfakes on market manipulation, examining traditional and new techniques, legal implications, and real-world examples. Learn about solutions to combat this emerging threat.
Explore DNS rebinding attacks, prevention techniques, and the concept of origin singularity. Learn about query analysis, protection bypasses, and practical defense strategies against this web security threat.
Explore SSO vulnerabilities, focusing on JWT and SAML tokens. Learn attack vectors, signature verification issues, and real-world implications for frameworks like WCF and SharePoint.
Explore DES-based cipher suite support in TLS, analyzing prevalence, geographical distribution, and implications for security. Learn why DES persists and how to remove it.
Explore innovative OSINT techniques to uncover phone numbers from email addresses, enhancing privacy and security investigations with cutting-edge methodologies and tools.
Explore modern document exploit kits, their infection chains, and techniques. Gain insights into ThreadKit, VenomKit, and various exploitation methods used in malicious documents.
Get personalized course recommendations, track subjects and courses with reminders, and more.