Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the science and technology behind the Chaotic Encryption Key System (CHEKS), including its concept, implementation, and practical application in a basic chat demo.
Explore object-oriented reverse engineering techniques for modern malware analysis, focusing on C++ code reconstruction and tools like HexRaysCodeXplorer for tackling complex malware frameworks.
Learn to hack your car's CAN bus using an open-source toolkit. Explore CAN basics, attack methods, hardware/software tools, diagnostic protocols, and security implications for modern vehicles.
Detailed analysis of MuddyWater APT group's evolving tactics, including use of Canarytokens, mixed payload delivery, and WSF-based RAT. Explores campaigns targeting Turkey, Armenia, Pakistan, and Arabian Peninsula.
Insights into BeyondCorp fundamentals, misconceptions, and roadmap for implementing zero trust architecture in organizations, addressing the lack of concrete guidance amidst vendor noise.
Techniques for deploying code undetected during red team engagements, evading modern EDR solutions. Insights from an experienced red teamer on covert operations in complex environments.
Explore deception techniques for pentesters, drawing insights from magicians. Learn key social engineering concepts, practical tips for phishing, phone engineering, and physical intrusion.
Explore machine learning techniques for classifying obfuscated code across JavaScript, Python, and PHP, enhancing cybersecurity analysis and threat detection capabilities.
Explore GPT models' potential in security research, covering semantic searching, few-shot learning, and code generation. Gain insights and inspiration for leveraging AI to empower security teams.
Explore detection-as-code for security teams: automate, test, and deploy robust detection systems using Azure DevOps, Microsoft Sentinel, and Defender suite. Improve effectiveness and maintain control across environments.
Discover advanced strategies for efficient bug hunting and pentesting using Burp Suite Pro. Learn GUI optimization, task automation, essential extensions, and niche techniques to enhance your workflow.
Develop specialized skills for reverse-engineering Go binaries, focusing on offensive security tooling. Learn methodologies and disassembler plugins to tackle this challenging language.
Hands-on deep-dive into Azure AD's OAuth implementation, covering JWT, token types, and attack scenarios. Learn to secure environments and detect token abuse.
Essential insights for effective incident response, covering crucial aspects often overlooked by beginners. Learn from real-world experiences to enhance your preparedness and decision-making during critical cybersecurity events.
Explore nation-state techniques for breaching air-gapped networks, analyzing similarities across frameworks and providing practical advice to enhance security and detect potential attacks.
Get personalized course recommendations, track subjects and courses with reminders, and more.