Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how domestic abusers exploit technology to control victims and learn strategies to improve digital literacy and safety tools for vulnerable populations.
Explore techniques for exploiting API webhooks, including SSRF attacks that can lead to cloud compromise, and learn about unique attack vectors in modern web services.
Explore the journey of writing and publishing a 400-page security book, from initial concept to final product, with insights into the realities of the process.
Explore Kubernetes lateral movements, identity types, and cluster-to-cloud authentication methods. Learn about real-world misconfigurations leading to cluster takeovers and prevention strategies.
Explore secure QR code frameworks for identity verification, focusing on privacy features that allow selective attribute disclosure. Learn about SMART Health Cards and a new open-source specification.
Explore randomness types, their importance, and applications. Learn about drand, a distributed randomness software, and its role in providing public, verifiable randomness as a service.
Explore passive intelligence gathering through domain squatting, including low-cost techniques, data analysis, and defensive strategies against this cyber threat.
Explores factors influencing password quality across countries, revealing literacy levels and internet usage impact. Aims to understand macrosocial protection factors for adapting password lists.
Exploring Canada's shift from pro-innovation to regulatory approach in Internet policy, covering broadcast, news media, online harms, and privacy regulations. Unpacks recent developments and government plans.
Hands-on workshop exploring APT tactics for privilege escalation and persistence. Learn to develop stealthy implants through 7 labs on Windows process injection techniques.
Hands-on workshop exploring Web Application Firewall bypass techniques, including encoding, SQL injection, protocol switching, and syntax alternatives. Practical exercises with in-depth explanations for each method.
Explore HTTP Request Smuggling attacks, risks, and payloads. Learn to detect and mitigate vulnerabilities in load balancers and proxies. Includes live demonstration and practical mitigation strategies.
Explore strategies to prevent burnout in cybersecurity professionals, improve talent retention, and maintain organizational security through effective mental health support and skill development.
Learn to identify and utilize security metrics that truly matter for effective organizational protection, focusing on improvement and smart resource allocation.
Explore key forensic artifacts in cloud storage services like OneDrive and Dropbox, focusing on data exfiltration detection and acquisition techniques for endpoint investigations.
Get personalized course recommendations, track subjects and courses with reminders, and more.