Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore real-world anti-forensics techniques employed by threat actors, gaining insights into their methods and strategies for evading detection and analysis.
Dive into the hidden corners of the internet, exploring dark web forums, markets, and scams. Gain insights into this secretive digital underworld and its operations.
Explore the hidden world of cybercriminal travel services, uncovering underground agencies, fraud schemes, and vulnerabilities in the hospitality industry.
Discover advanced OSINT techniques for social media intelligence gathering, focusing on efficient methods to extract valuable information from online platforms.
Discover how to automate malware detection and tracking using big data analytics and machine learning clustering techniques for enhanced cybersecurity threat hunting and campaign analysis.
Discover how to safeguard against quantum computing threats with NIST-standardized algorithms, hybrid crypto techniques, and practical implementation strategies for quantum-resistant cryptography.
Explore how OWASP Top 10 principles for ML and LLMs could have prevented HAL 9000's catastrophic failures in 2001: A Space Odyssey, with practical applications for modern AI security.
Explore real-world phishing cases and criminal psychology to understand attack methodologies, victim profiling, and exploitation techniques, enhancing your cybersecurity defense capabilities.
Explore SIEM vulnerabilities, attack vectors, and defensive strategies, covering data ingestion manipulation, correlation rule exploitation, and organizational security processes in SOC environments.
Explore critical national infrastructure systems, industrial control technologies, and cybersecurity vulnerabilities while learning about testbeds, protocols, and protective measures for vital infrastructure.
Dive into advanced EDR bypass techniques using minifilters, exploring a novel approach to disable endpoint detection systems through kernel-level manipulation and PreOperation callback registration.
Explore how metawar and emerging technologies threaten our cognitive infrastructure, and learn defensive strategies to protect human consciousness in an evolving digital landscape.
Explore hardware/software binding techniques for securing IoT SoCs, from architecture fundamentals to practical implementation strategies for protecting connected devices against cyber threats.
Explore a unique analysis of 96 threat actors' exposed systems, revealing their tools, commands, targets, and operational methods through their inadvertently published directories and logs.
Explore critical CI/CD pipeline security concepts and learn practical strategies to protect resources, enhance visibility, and prevent attacks through improved observability and compliance measures.
Get personalized course recommendations, track subjects and courses with reminders, and more.