Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore DNS tunneling techniques for data exfiltration and command-and-control, including detection methods and practical demonstrations of this stealthy network attack vector.
Explore the history and limitations of network intrusion detection systems, examining evasion techniques and inherent problems while critically evaluating vendor claims and industry acceptance.
Explore continuous security testing in DevOps using BDD-Security framework. Learn to specify requirements, create executable tests, and integrate with CI/CD for on-demand security assessments.
Discover simple techniques to evade antivirus systems, including signature detection, emulation, sandboxing, and firewalls. Learn how attackers can bypass popular security measures with minimal effort and resources.
Explore a Python-based toolkit for exploiting CSRF vulnerabilities, including demos of complex exploitation techniques and a custom HTTP proxy for injecting malicious iframes.
Explore kernel vulnerabilities in Windows and their impact on security solutions. Learn how to bypass multiple layers of protection and discuss more robust defensive strategies.
Explore MITRE D3FEND, a knowledge graph of cybersecurity countermeasures. Learn about its structure, use cases, and how it complements the ATT&CK framework for enhanced defensive strategies.
Explore essential DFIR skills, from understanding applications and APIs to analyzing C2 beacons, with insights from an experienced practitioner's career journey.
Explore cyber hygiene beyond zero-day threats, understanding vulnerabilities and advisories to enhance overall security posture and risk management.
Explore the pitfalls of JWTs, their unnecessary complexity, and better alternatives for secure authentication in web applications.
Explore the security risks associated with big data lakes and learn strategies to prevent data leaks in large-scale data storage systems.
Explore techniques for efficiently searching and analyzing large datasets, enhancing data accessibility and insights for security professionals.
Explore MITRE D3FEND, a framework for cybersecurity defense techniques. Learn about its structure, applications, and how it complements ATT&CK to enhance organizational security posture.
Explore modern red team techniques, tools, and operational security practices for effective penetration testing and cybersecurity assessments.
Explore chaos engineering principles, benefits, and implementation strategies to enhance system resilience and reliability through controlled failure experiments.
Get personalized course recommendations, track subjects and courses with reminders, and more.