Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover why cybersecurity expert Alex Holden navigates the dark web daily, exploring underground threats and criminal activities to protect organizations from cyber attacks.
Discover how researchers accidentally found a Windows RCE vulnerability while investigating NTLM reflection attacks and their modern security implications.
Discover how attackers collect clear-text passwords through various attack vectors and learn defensive strategies to protect against credential harvesting techniques.
Uncover Windows DPAPI vulnerabilities and exploitation techniques to understand how attackers abuse the Data Protection API for credential theft and privilege escalation.
Discover how modern attackers exploit trust relationships and social engineering tactics to breach systems without traditional exploits in this cybersecurity talk.
Dive into the technical analysis and decryption methods of the Chaos ransomware family, exploring its characteristics, vulnerabilities, and countermeasures.
Master essential tools and investigative techniques for SOC analysis, featuring proven tips and tricks to enhance security incident response and threat detection capabilities.
Discover essential strategies for integrating security into DevOps practices, fostering collaboration between development and security teams for more robust software delivery pipelines.
Discover effective strategies for automating OSINT and reconnaissance processes to streamline cybersecurity investigations and threat intelligence gathering.
Discover advanced breach detection techniques through deceptive honeypot strategies and learn how to implement effective security measures for enhanced threat identification.
Discover how Siemens CERT automates and scales digital forensic investigations through SiERRA, exploring practical approaches to handling large-scale security incidents efficiently.
Explore the emerging field of DNA cryptography, its future implications, and ethical considerations in data security and biological encryption systems.
Explore potential security vulnerabilities and threat landscapes within the InterPlanetary File System (IPFS) protocol through expert analysis and real-world examples.
Explore container security challenges and reduction strategies to enhance your Docker environment's protection against vulnerabilities and potential threats.
Dive into a revealing analysis of ransomware operations through a critical OPSEC failure, uncovering valuable intelligence insights and defensive strategies against cybercrime toolsets.
Get personalized course recommendations, track subjects and courses with reminders, and more.