Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Marketing
Communication Skills
Digital Skills
Terrorism and Counterterrorism: Comparing Theory and Practice
Molecular Biology - Part 1: DNA Replication and Repair
Comprendere la filosofia
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore privacy from a unique perspective with Sarah Jamie Lewis from Cooper. Learn through real-life stories about the need for inclusive, safe systems for marginalized individuals. Less than 1hr.
Learn to secure PHP applications with Snuffleupagus, an open-source security module, in under an hour with Cooper's experts.
Explore real-world cryptographic disasters with Cooper's under 1-hour material. Learn to identify failures, subvert malware intent, and potentially save yourself from sticky situations.
Learn how to engineer a sensor network to capture and interpret 802.11x frames, resolve GPS locations, and carry out MiTM attacks with Cooper's under 1-hour material.
Explore the security vulnerabilities of modern intercom systems with Sébastien Dudek, a security consultant at Synacktiv. Learn about attack vectors, practical attacks, and security recommendations in under an hour.
Explore the intriguing world of malware with Marion Marschalek, Principal Malware Researcher at G DATA Advanced Analytics. In less than an hour, delve into the unique traits, stealth tactics, and functionalities of CheshireCat malware.
Explore the impact of IoT devices on cybersecurity, learn about common attack scenarios, and understand how to protect against them in this less than 1-hour program by Cooper.
Learn the fundamentals of x86 platform misuse for security research in less than an hour with Cooper's online material, led by expert Jacob I. Torrey.
Learn to identify and combat credential exposure at scale with a framework developed by Matt Weeks, a leading researcher at Cooper. Less than 1-hour workload.
Explore deep learning system vulnerabilities with Stanford graduate Clarence Chio in this under 1-hour session by Cooper. Learn to tamper with popular software, manipulate recognition systems, and understand security shortcomings.
Explore the impact of small adversaries on internet security and learn how to empower users to combat cybercrime in this less than 1-hour material by Cooper.
Explore the evolution of proactive defense architecture in information security with Saumil Shah, CEO of Net-Square. Less than 1-hour workload. Offered by Cooper.
Learn to automate exploit generation and JavaScript analysis with WinDBG in under an hour. Presented by Fitzl Csaba and Miklos Desbordes-Korcsev from Cooper.
Learn to develop reusable security tools using The Metabrik Platform in less than an hour with Cooper. This program covers forensic analysis, malware analysis, and penetration testing.
Explore autonomous hacking with Cooper's presentation on Mechanical Phish, a system that exploits and patches binaries automatically. Learn from the third-place winner of the DARPA Cyber Grand Challenge.
Get personalized course recommendations, track subjects and courses with reminders, and more.