Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore essential cybersecurity principles through 8 key insights, offering practical wisdom for securing code and protecting digital assets in today's threat landscape.
Discover how to exploit Android disk encryption vulnerabilities through evil maid attacks, exploring practical techniques and security implications for mobile device protection.
Discover effective vulnerability analysis techniques and best practices for development teams, focusing on identifying and mitigating security risks in software development.
Discover advanced strategies and methodologies for building, managing, and leading effective red teams in cybersecurity operations and penetration testing environments.
Discover practical strategies for incrementally improving security in your organization through the lens of a security champion's daily experiences and lessons learned.
Dive into cloud infrastructure security vulnerabilities and defense strategies through real-world attack scenarios and practical mitigation techniques for modern cloud environments.
Dive into advanced reverse engineering techniques using Intel Processor Trace technology to analyze control flow and enhance software debugging capabilities.
Explore fascinating edge cases and unconventional security flaws in systems, examining unique vulnerabilities that challenge traditional cybersecurity approaches and defensive strategies.
Explore Linux's /proc filesystem for security analysis, learning essential techniques for threat detection, process monitoring, and digital forensics in real-world scenarios.
Dive into bootloader security vulnerabilities and learn effective mitigation strategies for protecting systems during the critical boot process.
Discover effective strategies for leading and motivating penetration testing teams, fostering a purposeful work environment, and driving successful security assessments.
Discover real-world physical security challenges and solutions through engaging stories of penetration testing, social engineering, and security assessments from experienced security professionals.
Explore essential post-container compromise techniques and immediate actions for security professionals, focusing on critical first-response strategies and containment methods.
Dive into space communication vulnerabilities and learn how to analyze the Space Link Extension protocol, exploring potential security weaknesses in satellite ground control systems.
Discover how machine learning feedback loops enhance real-time threat intelligence systems, improving cybersecurity detection and response capabilities through automated learning mechanisms.
Get personalized course recommendations, track subjects and courses with reminders, and more.