Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the latest cyber threats including FileFix tools and Remcos RAT delivery methods, plus collaborative threat actor tactics and detection challenges.
Discover how fake PuTTY ads spread CleanUpLoader malware and learn about June's top 10 cyber threats, including Atomic Stealer family tactics and Rhysida ransomware delivery methods.
Master threat emulation techniques using Atomic Red Team to validate detection capabilities against ransomware threats, incorporating cyber threat intelligence for enhanced security response and validation.
Master behavioral detection strategies and prevention techniques to effectively identify malicious activities, reduce false positives, and strengthen security defenses using open-source tools.
Discover comprehensive strategies for detecting and combating information-stealing malware, from identification and detection methods to practical mitigation techniques for both Windows and macOS systems.
Dive into advanced WMI threat detection techniques and investigation methods using Microsoft Defender for Endpoint to identify and counter malicious lateral movement attempts.
Discover how adversaries exploit Windows Management Instrumentation (WMI) for persistence, with expert insights on detection strategies and real-world examples from MITRE ATT&CK® and Microsoft specialists.
Discover how adversaries exploit installer packages across operating systems and learn effective investigation techniques and defensive strategies against malicious installers with MITRE ATT&CK expertise.
Master essential incident response strategies to enhance organizational security through planning, detection, communication, and continuous drilling programs for rapid threat mitigation.
Discover effective tactics to protect AWS environments from threats, enhance cloud security monitoring, and implement robust detection and response strategies for modern cloud infrastructure.
Discover how to effectively integrate GenAI into security operations, focusing on practical implementation strategies, optimal use cases, and real-world SOC applications.
Discover how to modernize your Security Operations Center with effective strategies, from leveraging new technologies to optimizing insourcing and outsourcing decisions for enhanced threat response.
Master EDR telemetry analysis and validation techniques to effectively detect adversary tradecraft, automate testing workflows, and leverage ATT&CK framework for comprehensive security coverage.
Discover essential techniques for detecting and preventing Business Email Compromise attacks, including MFA bypass methods, authentication protocols, and effective monitoring strategies for organizational security.
Explore real-world cloud security threats and defense strategies in AWS and Azure, covering access exploitation, privilege escalation, and effective countermeasures for robust protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.