Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover implementation challenges of AWS egress controls at scale, including service limitations, evasion techniques, and unexpected issues when processing terabytes of traffic daily.
Discover security challenges and solutions for shared GPU access in cloud environments, covering NVIDIA hardware architecture, PCIe threats, and practical mitigations from Fly.io's experience.
Discover open-source tools to demystify AWS IAM policies, model access control, and answer critical security questions about resource permissions and policy changes.
Uncover a critical Entra ID vulnerability allowing Application Administrator to Global Admin escalation via service principal backdoors and learn mitigation strategies.
Uncover how GCP error codes like "resource not found" can enhance incident response, improve detection rules, and reveal potential reconnaissance attempts in cloud security.
Discover how security consultants built a production-ready AWS environment from scratch on a tight budget, covering authentication, organization structure, deployment, and monitoring strategies.
Discover how to identify identity ownership in Infrastructure-as-Code environments when traditional audit logs fall short, using advanced analysis techniques.
Discover how a single container escape vulnerability in NVIDIA Container Toolkit compromised three major cloud providers, revealing critical security flaws in GPU infrastructure.
Uncover how Microsoft Entra ID's Privileged Identity Management creates false security and learn to transform procedural formalities into meaningful protection against threats.
Uncover AWS IAM's hidden complexities and duplicitous permissions that create security blind spots, exploring how similar actions can bypass monitoring and create vulnerabilities.
Uncover methodologies attackers use to compromise AI agents, bypass security controls, and access sensitive data, plus learn actionable mitigation strategies for protection.
Uncover the hidden truths behind conference talks and engineering blogs by learning to read between the lines and extract meaningful insights despite omissions and half-truths.
Discover how to train LLMs on cloud audit logs to create powerful anomaly detection engines that reduce false positives and enhance security insights.
Explore logging and observability challenges in AI-as-a-Service platforms, learning detection strategies and practical solutions for LLM-based PaaS offerings.
Uncover how nation-state actors exploit trusted cloud partnerships to breach multiple victims through Microsoft CSPs and SaaS providers, plus learn detection and mitigation strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.