Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Master building effective AI agents for cybersecurity operations through hands-on demonstrations of phishing classification workflows and production-ready automation techniques.
Learn step-by-step techniques for analyzing suspicious security alerts through command lines, process trees, and event logs to effectively determine legitimate threats from false positives.
Dive into the Black Basta ransomware threat with Red Canary experts as they analyze its precursors, technical tradecraft, and defensive measures to protect organizations from this and other ransomware threats.
Delve into the analysis of HijackLoader and Arechclient2 (SectopRAT) malware, exploring how these threats target browser data and crypto wallets, with insights from Red Canary's intelligence team.
Discover how security teams can leverage AI agents, machine learning, and data science to enhance security operations, with insights on generative AI's strengths and limitations in threat detection and investigation.
Discover essential strategies to protect against privileged user attacks, covering developer security risks, environment isolation, and time-bounded credentials for enhanced cybersecurity.
Explore how adversaries gain initial access to systems through spear phishing, drive-by downloads, and supply chain compromises with cybersecurity experts from Red Canary, Proofpoint, and MITRE.
Discover how to combat rising identity security threats in cloud accounts through context-aware detection, behavior analysis, and strategic partnerships with Microsoft for effective threat mitigation.
Discover why traditional security training fails and learn to recognize social engineering tactics like email bombing and paste-and-run techniques that exploit user vulnerabilities.
Discover how to implement effective security metrics beyond averages, focusing on accuracy, coverage, and timeliness to better assess your organization's security posture.
Explore the latest cyber threats including FileFix tools and Remcos RAT delivery methods, plus collaborative threat actor tactics and detection challenges.
Explore NPM package security threats and learn to manage threat intelligence overload through real-world examples of supply chain attacks and cybersecurity incident analysis.
Discover how fake PuTTY ads spread CleanUpLoader malware and learn about June's top 10 cyber threats, including Atomic Stealer family tactics and Rhysida ransomware delivery methods.
Master threat emulation techniques using Atomic Red Team to validate detection capabilities against ransomware threats, incorporating cyber threat intelligence for enhanced security response and validation.
Master behavioral detection strategies and prevention techniques to effectively identify malicious activities, reduce false positives, and strengthen security defenses using open-source tools.
Get personalized course recommendations, track subjects and courses with reminders, and more.