Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to identify weaponized file formats using Ftguess tool for enhanced cybersecurity analysis and threat detection in digital forensics.
Discover how Livewire's unmarshalling process can lead to remote command execution vulnerabilities in web applications through practical security analysis.
Discover practical techniques for conducting physical attacks against full-disk encryption systems through real-world demonstrations and security analysis.
Explore Java ClassLoader vulnerabilities and learn how malicious code can create deceptive twin instances to compromise application security.
Discover how cybersecurity experts at the Internet Storm Center monitor global threats, analyze attack patterns, and coordinate incident response in this behind-the-scenes look.
Discover how attackers exploit localhost vulnerabilities to compromise developer environments through drive-by attacks and learn essential security measures.
Explore NTLM authentication vulnerabilities and legacy system security challenges in this cybersecurity analysis by Marina Bochenkova.
Discover Kaitai Struct, a powerful tool for parsing and handling binary file formats efficiently in your development projects.
Discover how to seamlessly integrate Zeek network security monitoring with external applications for enhanced threat detection and analysis capabilities.
Explore how open source software spreads and influences technology ecosystems through viral-like adoption patterns and community-driven development models.
Uncover how cybercriminals exploit legacy drivers in large-scale attacks and learn detection techniques to protect against these silent security threats.
Discover how cybercriminals exploit blockchain technology for malicious purposes in this 29-minute security analysis by Paul Rascagneres.
Discover how to reverse engineer a pay phone system through hands-on hardware analysis and security research techniques.
Discover how to construct effective threat landscapes using practical methodologies and real-world security analysis techniques in this cybersecurity presentation.
Discover Slovakia's approach to proactive cybersecurity and vulnerability disclosure through real-world lessons and expert insights from industry practitioners.
Get personalized course recommendations, track subjects and courses with reminders, and more.