Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how GRC Engineering transforms AWS compliance from manual processes into automated, strategic assets using native tools and infrastructure as code practices.
Discover how to modernize ROADRecon for Entra environments, transitioning from deprecated Azure AD Graph to Microsoft Graph API while exploring OAuth security implications.
Discover how to decode AWS IAM policies and understand real-world permissions across your cloud environment without manually parsing complex JSON configurations.
Explore nOAuth attacks and OpenID Connect flaws that enable SaaS application takeover, plus learn mitigation strategies from real-world exploitation examples.
Discover how to exploit an undocumented Amazon ECS protocol vulnerability that enables low-privileged roles to hijack higher-privileged container IAM permissions on shared EC2 instances.
Uncover the whoAMI attack technique that enables remote code execution across thousands of AWS accounts through AMI name confusion vulnerabilities and learn defense strategies.
Uncover hidden security risks in GitHub Actions secrets and learn practical strategies to protect CI/CD pipelines from misconfigurations and unauthorized access.
Discover advanced threat hunting techniques for appliance environments using cloud metadata analysis to uncover persistent threats and enhance security defenses against hard-to-detect attacks.
Discover practical techniques for building reliable AI systems that analyze Terraform and CDK code, eliminating hallucinations and false positives in cloud security reviews.
Discover vendor-agnostic cloud threat hunting strategies combining hypothesis-driven investigations, TTP-based hunts, and anomaly detection to uncover sophisticated cloud-native attacks.
Uncover critical vulnerabilities in GCP Tenant Projects through real-world exploitation scenarios and learn defensive strategies against multi-tenant architecture attacks.
Explore Microsoft's legal battle against LLMjacking threat actors who exploit cloud AI services to create harmful deepfakes, learning defense strategies for this evolving threat.
Explore vendor-managed cloud deployments, their security risks, and mitigation strategies for organizations balancing operational savings with expanded attack surfaces.
Explore hidden SharePoint APIs to understand attack vectors and defense strategies in Microsoft 365 environments, bypassing Graph API detection methods.
Uncover critical vulnerabilities and secrets hidden in Google's Artifact Registry container images through comprehensive security research findings.
Get personalized course recommendations, track subjects and courses with reminders, and more.