Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore digital forensics and incident response using Velociraptor. Learn about VFS, artifacts, automation, process tracking, and hunting for compromised machines with practical demonstrations and expert insights.
Explore API security essentials, learn testing importance, and gain insights from industry experts. Discover practical tips for securing APIs and starting your journey in API hacking.
Explore hands-on ransomware analysis with demos of RAASNet, Yashma, and Lockbit. Learn configuration, building, and detonation techniques from a malware analyst's perspective.
Master the art of gathering and analyzing open-source intelligence through practical techniques and methodologies for effective information collection and investigation.
Discover how to use Nuclei for uncovering exposed .git repositories and extracting sensitive information from web applications in this cybersecurity demonstration.
Learn filter evasion techniques for reverse shells, including code obfuscation and bypassing security measures, to enhance your penetration testing skills.
Explore Java deserialization vulnerabilities and create custom exploits for remote code execution in this hands-on tutorial, featuring practical examples and step-by-step guidance.
Explore the deceptive tactics of malware disguised as CAPTCHA, uncovering its distribution methods and analyzing its impact on cybersecurity.
Explore techniques for cracking Active Directory passwords and exploiting MFA fatigue vulnerabilities. Learn to strengthen organizational security through robust password policies and MFA implementation.
Explore the common locations and techniques malware uses to hide on your computer, enhancing your cybersecurity awareness and detection skills.
Explore MedusaLocker ransomware's behavior and tactics through dynamic analysis, gaining insights into its encryption process and file manipulation techniques.
Explore website scanning challenges and cybersecurity techniques with John Hammond. Learn about protective measures like Cloaking Firewall and gain insights into infrastructure security.
Explore self-extracting executables for hackers: creation, analysis, and implications. Gain insights into this cybersecurity technique for enhanced understanding and protection.
Hands-on practice with SQL injection techniques in a safe environment. Learn to identify and exploit vulnerabilities, enhancing your cybersecurity skills and understanding of database security.
Explore the Mark of the Web security feature, its impact on file downloads, and how it affects system protection and user experience in Windows operating systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.