Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore self-extracting executables for hackers: creation, analysis, and implications. Gain insights into this cybersecurity technique for enhanced understanding and protection.
Hands-on practice with SQL injection techniques in a safe environment. Learn to identify and exploit vulnerabilities, enhancing your cybersecurity skills and understanding of database security.
Explore the Mark of the Web security feature, its impact on file downloads, and how it affects system protection and user experience in Windows operating systems.
Explore techniques to safely recover and analyze quarantined malware, enhancing cybersecurity skills and understanding of malicious software behavior.
Análisis detallado del ataque de phishing a Linus Tech Tips, explorando técnicas utilizadas y lecciones de ciberseguridad para prevenir incidentes similares.
Explore techniques for compromising Docker container registries, uncovering vulnerabilities and potential security risks in containerized environments.
Explore the Illicit Consent Grant Attack, a sophisticated technique exploiting OAuth permissions in Azure AD. Learn how attackers manipulate consent to gain unauthorized access to sensitive resources.
Explore forensic artifacts left by PsExec, a powerful remote administration tool, to uncover evidence of potential hacking activities and enhance your cybersecurity investigation skills.
Explore game hacking techniques using dnSpy to modify Unity games. Learn to analyze and manipulate game code, gaining insights into cybersecurity and reverse engineering.
Explore how WhatsApp Messenger can execute arbitrary Python code, uncovering potential security implications and vulnerabilities in this popular messaging platform.
Explore the common locations and techniques malware uses to hide on your computer, enhancing your cybersecurity awareness and detection skills.
Explore techniques for cracking Active Directory passwords and exploiting MFA fatigue vulnerabilities. Learn to strengthen organizational security through robust password policies and MFA implementation.
Explore how Github allows access to deleted and private commits, uncovering potential security implications and understanding the reasoning behind this intentional design choice.
Discover three effective techniques for hacking mobile applications, enhancing your cybersecurity skills and understanding of app vulnerabilities.
Dive into a comprehensive reverse engineering analysis of malware targeting Cities Skylines II, exploring detection methods, threat intelligence, and cybersecurity implications through detailed technical breakdown.
Get personalized course recommendations, track subjects and courses with reminders, and more.