Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive guide to planning and executing Red Team operations, covering scope definition, rules of engagement, and reporting strategies. Includes valuable resources and templates.
Explore MITRE ATT&CK Navigator for planning and orchestrating Red Team operations, enhancing cybersecurity strategies with advanced threat mapping techniques.
Explore industry-standard frameworks and methodologies for planning and executing successful Red Team operations, enhancing your cybersecurity skills and knowledge.
Master Active Directory enumeration techniques used by FIN6 through hands-on practice with Windows commands, PowerShell cmdlets, and AdFind.exe in a secure lab environment.
Dive into FIN6's exfiltration techniques in this hands-on demonstration showing how this financial threat actor collects, stages, archives, and transfers sensitive data from compromised systems using FTP.
Discover the world of Advanced Persistent Threats (APTs), their classifications, naming conventions, and operational tactics used by nation-state actors, with insights into tracking and identification methods.
Dive into advanced spear-phishing techniques by learning to create malicious Word macro documents for initial access, following FIN6's tactics in a practical lab environment.
Learn how to create effective adversary emulation plans by selecting relevant threat actors, leveraging cyber threat intelligence, and mapping TTPs using the MITRE ATT&CK framework.
Master advanced threat emulation techniques by exploring FIN6's sophisticated TTPs, from initial access to exfiltration, using the Center for Threat-Informed Defense Adversary Emulation Library.
Discover how to emulate adversary tactics and techniques in red team operations, understanding the key differences between emulation and simulation for effective security testing.
Learn web app penetration testing techniques using Burp Suite, including setup, brute force attacks, and CSRF vulnerability assessment.
Master Linux essentials for ethical hacking: file management, permissions, networking, security tools, and hands-on challenges to enhance your skills and protect systems effectively.
Learn to develop TCP servers, clients, and scanners using Python3 for penetration testing. Gain practical skills in network security and ethical hacking.
Automate penetration testing methodology using Linux utilities and custom ZSH plugins. Learn to set up an efficient terminal environment for enhanced cybersecurity workflows.
Explore Docker's potential for pentesting and bug bounty hunting. Learn to set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit, enhancing your cybersecurity skills and workflow efficiency.
Get personalized course recommendations, track subjects and courses with reminders, and more.