Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore serverless architecture vulnerabilities and learn how malware can exploit AWS Lambda functions, with insights on prevention and security best practices.
Explore advanced kernel exploit techniques using page table manipulations to bypass Windows 10 mitigations. Learn virtualization-based security and memory management concepts.
Practical strategies for personal disaster recovery planning, covering digital security, backups, financial preparedness, and ensuring loved ones can manage your affairs in emergencies.
Explore adversarial machine learning's current landscape, including attack types, vulnerabilities, and defense strategies. Gain insights into visual understanding and notable research in this critical field.
Learn techniques to bypass antivirus using open source tools like Malleable C2, MSFVenom, and PowerShell. Explore examples and scripts for more effective penetration testing and security assessments.
Explore techniques for disabling encryption to access confidential data, including man-in-the-middle attacks, AWS vulnerabilities, and TLS exploits. Learn practical methods and necessary tools for intercepting encrypted communications.
Learn Agile methodology principles, implementation strategies, and best practices for effective team management and project delivery in this concise, practical guide.
Explore career opportunities in cybersecurity events through expert insights on volunteering, networking, and professional growth. Gain valuable tips for resume building and conference management.
Explore the synergy between security and DevOps, focusing on asset management, automation, and best practices for enhanced cybersecurity in modern IT environments.
Explore advanced techniques for exploiting password reuse vulnerabilities, focusing on bcrypt and other hashing methods to enhance cybersecurity knowledge and ethical hacking skills.
Explore robot security challenges, attack surfaces, and protection strategies for hardware, software, and user privacy in the era of widespread robotic adoption.
Explore advanced password cracking techniques, from leveraging leaks to using Markov chains and attacking phrases in multiple languages. Learn cutting-edge methods for WPA2 and heavy-duty algorithms.
Explore a new tool for creating resilient security competition infrastructures, addressing challenges in competition networks and offering innovative solutions for organizers.
Discover strategies for building effective ambassadors to drive change, reduce friction, and improve organizational efficiency in cybersecurity and beyond.
Explore cyber safety disclosure with experts, covering medical device security, vulnerability equities, and government initiatives. Gain insights into critical cybersecurity challenges and solutions.
Get personalized course recommendations, track subjects and courses with reminders, and more.