Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Map attack paths in Entra/Azure AD and on-premise AD using BloodHound. Explore hybrid attack scenarios and learn defensive strategies for securing cloud and endpoint environments.
Learn how to enhance Windows security by disabling the Win+R run dialog, protecting against common social engineering attacks and malicious command execution techniques.
Discover how account takeover and session hijacking attacks work through a practical demonstration of compromising a Reddit account using cookie theft and exploitation techniques.
Uncover how hackers exploit MeshCentral as a Remote Access Trojan (RAT), exploring cybersecurity vulnerabilities and threat intelligence techniques to enhance your defensive strategies.
Explore how malicious actors exploit the Godot game engine as a sophisticated malware delivery system, examining detection evasion techniques and security implications.
Master Python scripting in Binary Ninja for enhanced reverse engineering and binary analysis capabilities, focusing on practical automation techniques and workflow optimization.
Uncover how malicious actors exploit Google Ads to distribute fake Homebrew malware, examining detection methods and security implications for macOS users and developers.
Dive into techniques for identifying and analyzing malicious popup scams while learning essential cybersecurity skills to protect against common social engineering tactics and browser-based threats.
Dive into malware analysis techniques by examining a malicious ChatGPT browser extension, learning essential skills for SOC analysts and digital forensics investigators through hands-on investigation.
Discover how to enhance web application penetration testing using Burp AI, a tool designed to augment your workflow in finding vulnerabilities and hunting for bugs.
Discover how to backdoor Cursor AI, exploring cybersecurity vulnerabilities and penetration testing techniques in this detailed walkthrough of security exploits.
Explore the deceptive world of malware disguised as MP3 files in this cybersecurity analysis that reveals hidden threats and protection strategies.
Explore the critical Next.js vulnerability with a 9.1 severity rating, understanding its implications for web security and how middleware corruption can be exploited.
Discover how a cybersecurity expert fell victim to hacking, exploring the phishing campaign that compromised a Mailchimp mailing list and examining preventive measures including passkeys and email security solutions.
Discover how to enhance your security by blocking all network connections using Windows Firewall, with step-by-step guidance on configuring rules and managing exceptions for essential services.
Get personalized course recommendations, track subjects and courses with reminders, and more.