Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cognitive behavioral therapy techniques for managing anxiety and improving mental health during challenging times, with insights from a People Program Manager.
Hacker101 is a collection of videos that will teach you everything you need to operate as a bug bounty hunter.
Discover how Zoom implements AI-augmented defense strategies to combat evolving threats and manage expanding attack surfaces in today's dynamic security landscape.
Explore how AI is transforming offensive security with data-driven insights on prompt injection attacks, autonomous agents, and evolving defensive strategies from Black Hat Europe 2025.
Discover how AI and human creativity are reshaping cybersecurity through real data insights, vulnerability trends, and expert analysis from leading security researchers and practitioners.
Discover how AI red teaming differs from traditional methods, focusing on real-world security risks in LLM applications and the essential human expertise needed to find vulnerabilities.
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Discover how bug bounty hunting can boost your cybersecurity career. Expert hackers share insights on skill development, networking, and leveraging experiences for future opportunities.
Explore VNC client vulnerabilities and learn how malicious servers can exploit them. Gain insights from an award-winning hacker on application security and sustainable DevSecOps practices.
Explore XSS sanitizer fuzzing techniques with Tom Anthony, from his hacking past to current cybersecurity insights. Learn about innovative approaches to discovering vulnerabilities in web applications.
Discover advanced techniques for application analysis in bug hunting with insights from a top-ranked researcher. Learn recon strategies and web app vulnerabilities to enhance your ethical hacking skills.
Explore unique vulnerabilities discovered by hacker Roni Carta, inspired by Arsene Lupin. Learn creative exploitation techniques and gain insights into the world of ethical hacking.
Learn insider tips for crafting high-quality bug bounty reports from Roy Davis, an experienced security researcher and manager of Zoom's Bug Bounty program. Gain valuable insights to improve your submissions.
Explore how TikTok's algorithm and user base are leveraged to introduce networking and security concepts to a wider audience through engaging short-form content.
Explore vulnerability research in office applications through fuzzing, code review, and reverse-engineering. Learn to discover and exploit zero-days, with insights on binary exploitation for curious researchers.
Get personalized course recommendations, track subjects and courses with reminders, and more.