Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master PowerShell for network threat hunting by detecting IOCs, analyzing suspicious connections with Netstat, correlating processes, and identifying malware beacons.
Master IT fundamentals through hands-on help desk scenarios and real-world troubleshooting techniques in this comprehensive 9-hour training program.
Discover strategic approaches to achieving cybersecurity goals in 2026 through actionable techniques like micro-actions, workspace optimization, and meaningful goal selection.
Explore digital forensics fundamentals, from Locard's principle to analyzing Windows artifacts, registry hives, and file system evidence for cybersecurity investigations.
Learn comprehensive web application penetration testing techniques, from enumeration to advanced exploits, with hands-on practice and real-world bug bounty hunting scenarios.
Learn ethical hacking through hands-on practice with 10 beginner-friendly penetration testing episodes, covering various vulnerabilities and exploitation techniques.
Comprehensive network penetration testing course covering Linux, Python, OSINT, scanning tools, enumeration, exploitation, Active Directory attacks, and more for aspiring ethical hackers.
Learn essential Linux commands for ethical hacking, from basic file system navigation to advanced scripting, preparing you for penetration testing and cybersecurity challenges.
Learn to exploit 32-bit Windows buffer overflows through step-by-step guidance, from introduction to gaining shells, with practical techniques for cybersecurity enthusiasts.
Master essential SOC analyst skills through comprehensive training on security operations, phishing analysis, network security monitoring, and endpoint security with hands-on labs and practical tools like Wireshark, tcpdump, and Snort.
Discover how attackers can create convincing romance scams using AI chatbots on Raspberry Pi hardware, with demonstrations of emotional manipulation techniques and code examples for cybersecurity awareness.
Comprehensive guide to becoming an ethical hacker, covering foundational IT skills, networking, Linux, coding, and advanced topics like Active Directory and web application hacking. Includes certification advice and community resources.
Comprehensive introduction to ethical hacking, covering networking basics, Linux skills, Python programming, and initial stages of penetration testing. Ideal for aspiring cybersecurity professionals.
Explore advanced features of Burp Suite Pro for ethical hacking and web application security testing. Learn powerful tools to enhance your penetration testing skills.
Learn to exploit SMB Relay attacks and gain remote access using Empire, enhancing your penetration testing skills and understanding of network security vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.