Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how a single Outlook registry setting sparked the creation of a powerful C2 framework used in red team operations against major corporations worldwide.
Discover how to revolutionize threat hunting using Python, Pandas, and data science techniques to overcome SIEM limitations and detect advanced adversarial activities more effectively.
Explore how to create custom Identity Providers using OpenID Connect to bypass MFA and establish persistence in Entra ID, including attack techniques and defense strategies.
Discover how attackers breached Snowflake's defenses, exposing 165+ customers' data, and learn actionable detection strategies to secure your cloud against evolving SaaS threats.
Explore how malware loaders evolve to bypass AI, EDR, and sandboxes, examining their commoditization and advanced evasion techniques in modern cyberattacks.
Discover 5 critical mistakes that Security Operations Centers make and learn how to avoid these common blue team pitfalls in cybersecurity defense.
Explore advanced phishing techniques and anti-phishing defenses, including URL scanning, browser extensions, and how attackers bypass protections using tools like Evilginx Pro.
Dive into macOS forensic analysis from basics to advanced techniques, covering plists, logs, metadata, persistence vectors, and malware analysis tools for security professionals.
Explore how AI-generated malware evades detection and learn proactive threat intelligence strategies to anticipate and counter emerging AI-driven cyber attacks.
Discover advanced lateral movement techniques that bypass modern EDR detection, moving beyond traditional tools like PsExec to execute stealthy payloads across compromised networks.
Explore advanced C2 communication techniques, beacon detection methods, and evasion strategies using popular frameworks to enhance network security defense capabilities.
Explore explainable AI techniques in cybersecurity to understand decision-making in AI-driven security systems, build trust, and improve incident response through real-world use cases.
Explore advanced Windows DLL loading mechanisms for stealthy code execution, bypassing AV/EDR detection through API proxying and remote process injection techniques.
Explore AI security threats and defense strategies through real-world attack case studies, learning to identify vulnerabilities and implement practical countermeasures for AI systems.
Discover how to build Nemesis 2.0, an automated file analysis platform for red teams that processes, enriches, and triages files like an offensive VirusTotal system.
Get personalized course recommendations, track subjects and courses with reminders, and more.