Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Chrome extension security threats and analysis techniques using the new CRXaminer tool, covering malicious extensions, threat modeling, and data insights from large-scale analysis.
Explore file system redirection vulnerabilities and learn advanced techniques for identifying and exploiting these security risks in Windows systems.
Explore security risks in Terraform, including privilege escalation and data exfiltration. Learn attack scenarios and practical recommendations for securing cloud infrastructure deployments.
Witness a groundbreaking AI DeepFake LIVE demo showcasing the viral CyberMirage technology. Explore cutting-edge cybersecurity implications with seasoned expert Brandon Kovacs at HackMiami XI.
Explore the reality of Detection-as-Code in cybersecurity. Separate hype from facts and understand its potential benefits for blue teams and threat detection programs.
Explore security risks of Terraform, demonstrating exploitation techniques for privilege escalation and unauthorized access. Learn practical recommendations for securing cloud infrastructure deployments.
Explore layers of cybersecurity, from solutions to human elements. Interact with attendees, review recent cyberattacks, and learn prevention strategies from an experienced expert.
Explore AI/ML's transformative potential in cybersecurity. Learn to leverage commercial and open-source platforms for offensive and defensive strategies, from voice manipulation to automated threat intelligence.
Explore AI policy frameworks, focusing on NIST's AI Risk Management Framework. Learn about its structure, application, and related resources to improve AI trustworthiness and development.
Explore AI's role in SOCs, addressing threat abstraction and correlation challenges. Enhance AI solution evaluation skills, separate hype from reality, and design AI-ready security operations.
Explore file system redirection vulnerabilities and learn dynamic testing techniques using Microsoft's Detours for effective bug hunting in Windows systems.
Explore Langchain's innovative approach to language processing, combining AI models with tree-of-thought reasoning. Learn key features, applications, and integration techniques for enhanced AI capabilities.
Master the art of crafting effective prompts for AI language models. Learn key principles, ethical considerations, and practical techniques to optimize AI interactions and outputs.
Explore FreeBSD jail security vulnerabilities and lockpicking techniques. Learn from experienced hackers about potential exploits and mitigation strategies for system administrators.
Dive deep into rootkits: explore their inner workings, detection techniques, and countermeasures. Learn to identify and neutralize these stealthy threats using advanced tools like Living Off The Land Drivers.
Get personalized course recommendations, track subjects and courses with reminders, and more.