Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the security vulnerabilities of brain wallets in cryptocurrency, analyzing usage patterns, draining techniques, and implications for blockchain technology.
Explore offensive security using microservices and FaaS, covering Lambda, Google Cloud, IBM OpenWhisk, and more. Learn practical applications and improvements for cybersecurity projects.
Explore Koadic C3, a Windows COM-based command and control framework. Learn about VBScript, threading, HTML applications, and lateral movement techniques for advanced penetration testing.
Insights on agency vs. corporate recruiters, red flags, and effective strategies for job seekers in cybersecurity. Practical tips for evaluating recruiters and optimizing LinkedIn profiles.
Explore Go language reverse engineering challenges, tool limitations, and strategies for function recovery and string analysis. Learn heuristics and resources for effective Go binary analysis.
Explore optimizations for Bitcoin key cracking, covering cryptographic concepts, algorithms, and techniques to enhance security and efficiency in cryptocurrency systems.
Participate in an immersive cyber crisis simulation led by experts, exploring decision-making, stakeholder dynamics, and geopolitical impacts in a high-stakes scenario.
Explore data visualization techniques to enhance machine learning models for malware detection, with practical insights and a live demonstration.
Explore Russian information operations as social engineering, examining tactics, targets, and mitigation strategies. Learn about RT's role and the impact on public perception.
Insights on navigating cybersecurity education, certifications, and career paths from Navy veteran Marcus Carey. Practical advice for aspiring professionals in the field.
Learn to create improvised physical security tools using everyday items. Discover techniques for bypassing locks and security systems in emergency situations.
Learn effective interrogation techniques to design improved tools for SOC teams, enhancing security operations and productivity through research-driven approaches.
Learn strategies for protecting digital privacy when interacting with law enforcement, including legal rights, threat modeling, and best practices for device security at borders.
Insights from NYC Cyber Command's frontline experiences, covering operational design, governance, threat modeling, and future cybersecurity strategies for urban environments.
Explore defensible social architecture in the era of big data, behavioral economics, and cyber threats. Learn strategies for modern detection systems and leveraging economics for better security policies.
Get personalized course recommendations, track subjects and courses with reminders, and more.