Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Web Development
Algorithms and Data Structures
Cybersecurity
Bitcoin and Cryptocurrency Technologies
Preventing Dementia
Greek and Roman Mythology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore threat intelligence integration for prioritizing detection sources, enhancing security strategies with MITRE ATT&CK, and leveraging internal and external intelligence for effective threat modeling.
Explore Zero Trust security: its principles, implementation, and impact on cybersecurity. Learn about identity governance, least privilege, and maturity models for effective protection against modern threats.
Explore evolving cybersecurity threats, from ransomware to DNS tunneling, and learn strategies to protect against sophisticated attacks in this DefCamp 2021 presentation.
Explore advanced adversary emulation techniques for Windows systems, focusing on penetration testing, red teaming, and the MITRE framework to enhance cybersecurity defenses.
Explore offensive and defensive cloud security strategies, including risks, audits, penetration testing, and real-world attack scenarios in this comprehensive DefCamp presentation.
Explore the importance of coding skills for security professionals, covering knowledge transfer methods, automation, and cross-specialization to enhance cybersecurity practices and team collaboration.
Explore burnout's impact on organizational security, its causes, and strategies for mitigation. Learn to foster a healthier work environment and enhance overall security posture.
Explore the delicate balance between technology and human factors in cybersecurity, examining vulnerabilities, tactics, and solutions to enhance organizational security posture.
Explore bug bounty hunting essentials, methodologies, and community insights. Learn from a passionate expert about getting started, understanding applications, and collaborating effectively in the field.
Explore advanced IoT botnet techniques, including hardware hacking, bootloader hijacking, and exploiting vulnerabilities in security cameras and enterprise messaging systems.
Explore continuous offense techniques to assess and enhance cybersecurity defenses. Learn about breach simulation tools, vulnerability assessment, and practical strategies for improving network security.
Explore the intersection of security and gaming at DefCamp 2019, covering antipiracy, cheating prevention, and future gaming platforms in the rapidly evolving industry.
Explore vulnerabilities in U.S. election systems and potential solutions, covering voter registration, voting machines, and result reporting. Learn about security measures and the importance of human factors in election integrity.
Explore vehicle component penetration testing, focusing on ECUs and FMS. Learn about CAN networks, OBD2 ports, and various hacking tools and techniques for automotive security.
Explore cloud adoption strategies to enhance IT security and user convenience, covering encryption, identity protection, and real-life implementation scenarios.
Get personalized course recommendations, track subjects and courses with reminders, and more.