Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Develop proactive cybersecurity skills through intelligence gathering, investigation techniques, and remediation methods to detect and mitigate potential threats before they compromise data.
Comprehensive exploration of OWASP Top 10 security risks, covering current and previous vulnerabilities with demos and real-life examples to enhance understanding of web application security.
Explore non-technical cybersecurity roles focusing on policies, frameworks, auditing, and risk management. Learn how to shape industry standards and make impactful decisions without technical expertise.
Comprehensive exploration of JavaScript security, covering front-end and Node.js. Learn to identify, prevent, and resolve attacks while building safer applications across various platforms.
Master all eight CISSP domains through expert-led training with real-world scenarios, preparing you for certification success and professional security expertise.
This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion.
Hands-on technical deep dive into incident response, covering network and memory forensics, data breach scenarios, and the SolarWinds supply chain attack, using real-world tools and techniques.
Explore cybersecurity leadership principles, integrating security, trust, and stability with the CIA Triad, while applying information security governance and the McKinsey 7S Change Model.
Learn to leverage Python for active defense strategies, including creating decoys, network manipulation, and monitoring systems to enhance cybersecurity measures.
Explore blockchain security, cryptography, consensus algorithms, smart contracts, and advanced concepts. Learn to identify vulnerabilities and protect against common attacks in blockchain ecosystems.
Explore Windows file systems, data storage, deletion processes, and recovery techniques. Learn to interpret file system structures and validate forensic tool information for enhanced investigative skills.
Enhance cybersecurity skills with advanced Python, automating reconnaissance, establishing command-and-control, and implementing defensive techniques for network analysis and threat detection.
Comprehensive guide to incident response phases, from preparation to recovery, with hands-on labs for technical skills in memory, network, and host analysis and forensics.
Explore OWASP's Top 10 cybersecurity risks, focusing on access control, cryptography, injection attacks, design flaws, and misconfigurations. Learn risk assessment and mitigation through demos and real-world examples.
This course is a Secure Javascript Programming Overview. It gives the student an introduction to JavaScript security and covers important topics like authentication best practices and refreshers on JavaScript, Web browsers and Node.js.
Get personalized course recommendations, track subjects and courses with reminders, and more.