Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical insights on vulnerability management, covering discovery, scoring, and risk acceptance plans, with recommendations for effective implementation in various organizational contexts.
Insights from WordPress Security Team's journey: challenges, strategies, and lessons in safeguarding open-source software and educating users on cybersecurity best practices.
Explore techniques for safely red teaming manufacturing networks, including reconnaissance, passive methods, and potential attack vectors, while learning mitigation strategies and best practices.
Explore Active Directory password blacklisting techniques, implementation challenges, and testing frameworks for enhanced security in Windows environments.
Gain insights on interviewing, career growth, and leadership in cybersecurity. Learn to navigate company culture, contribute effectively, and seize opportunities for professional development.
Explore Chrome extension vulnerabilities, security considerations, and potential exploits. Learn about architecture, headers, and isolation techniques for safer browsing experiences.
Explore MITRE ATT&CK framework to enhance threat intelligence and cyber defense strategies. Learn implementation tips, detection techniques, and industry examples for improved security posture.
Explore techniques for creating malware without coding, covering keyloggers, ransomware, and persistence methods. Learn about ethical hacking and cybersecurity vulnerabilities.
Explore payload-agnostic sandbox detection techniques, including sleep evasion, encryption, and user activity analysis. Learn to build profiles and implement various detection methods across languages.
Explore software-defined networking vulnerabilities, focusing on OpenFlow, controllers, and REST APIs. Learn to manipulate traffic flow and exploit SDN weaknesses.
Comprehensive exploration of Zero Trust Networks, covering theory, implementation strategies, key systems, and practical considerations for enhanced network security.
Explore reverse engineering and exploitation techniques, covering low-level programming, memory vulnerabilities, and essential tools for cybersecurity enthusiasts and professionals.
Explore cybersecurity challenges in healthcare with insights on task forces, device manufacturing, disclosure programs, and legacy systems from industry expert Josh Corman.
Explore the evolution of password security, common pitfalls, and best practices for creating strong, memorable passwords in this informative cybersecurity talk.
Explore advanced threat detection using AI and transfer learning techniques. Learn about active learning, data sharing, and improving phishing domain detection across organizations.
Get personalized course recommendations, track subjects and courses with reminders, and more.