Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the tactics and impact of Fangxiao, a Chinese phishing threat actor, in this insightful presentation by cybersecurity experts Emily Dennison and Alana Witten.
Learn strategies for implementing proactive security measures within your team, enhancing overall cybersecurity posture and fostering a security-conscious culture.
Explore Linux capabilities exploitation techniques, enhancing your understanding of system security vulnerabilities and potential attack vectors in Unix-like environments.
Explore TAXII protocol for secure cyber threat intelligence sharing. Learn its benefits, implementation, and role in enhancing organizational cybersecurity posture.
Explore the security implications of brain-computer interfaces, examining potential vulnerabilities and risks associated with this emerging technology.
Learn essential techniques and strategies for identifying and reporting software vulnerabilities, enhancing your skills in ethical hacking and cybersecurity.
Explore the controversial topic of ransomware decriminalization, examining potential impacts, ethical considerations, and policy implications for cybersecurity and law enforcement.
Explore cloud security risks in Git repositories, focusing on common misconfigurations and best practices for protecting sensitive information in version control systems.
Learn to create a private AWS security training lab using SecDevOps-Cuse/CyberRange. Explore automation, vulnerability management, and offensive security in a safe cloud environment.
Explore the rise of spear phishing, learn to identify vulnerable targets through social media, and discover effective protection strategies for individuals and organizations.
Explore Magecart's evolution, tactics, and techniques in compromising e-commerce sites for credit card skimming. Learn about high-profile breaches and the criminal underworld behind this cybercrime phenomenon.
Explore libpcap for offensive security: bypass firewalls, intercept traffic, manipulate network connections, and evade detection. Hands-on techniques with source code provided.
Explore the fascinating takedown of major darknet markets, including AlphaBay and Hansa, in this talk on international law enforcement operations, deception, and cybercrime investigations.
Maximizing security awareness through a champions program: scaling up, improving communication, enhancing security cost-effectively, and boosting incident reporting. Aligning with company culture for effective implementation.
Humorous exploration of data protection practices, contrasting organizations' claims with real-world breaches. Offers insights on improving security measures while highlighting both progress and challenges.
Get personalized course recommendations, track subjects and courses with reminders, and more.