Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Artificial Intelligence
Digital Marketing
Microsoft Excel
Introduction to HTML5
Computing in Python I: Fundamentals and Procedural Programming
Introduction to Marketing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Practical tools and methodologies to transform software security posture by eliminating false distinctions between security bugs and other defects, improving product quality and aligning teams.
Enhance your public speaking with expert tips on confidence, audience engagement, and effective slide design for impactful presentations in the tech industry.
Explore GCP Metadata API security: risks, attacks, defenses, and best practices. Learn about service accounts, Kubernetes, and Cloud Build implications for your organization's cloud infrastructure.
Explore Chrome extension risks, malicious examples, and Lyft's strategic approach to mitigate threats at scale. Learn effective strategies for enhancing browser security.
Explore VoIP vulnerabilities and hacking techniques, from historical phone phreaking to modern threats like toll fraud and vishing, with insights on protecting communication systems.
Explore effective software obfuscation techniques, their limitations, and a novel approach to enhance code protection against reverse engineering and analysis.
Explore creating a remote access trojan using TCP services like Whois and Finger, discussing implementation, detection, and mitigation strategies for this Live Off the Land technique.
Explore advanced file analysis techniques for enhanced threat detection, focusing on Strelka's features and applications in enterprise security.
Explore container orchestration security risks, focusing on exposed management nodes and APIs. Learn implications, recommendations, and see demonstrations of potential exploits in popular platforms.
Explore the tactics behind fake online accounts, from creation to manipulation, and learn how attackers exploit various vectors to influence the digital landscape at scale.
Explore WebAssembly's dual nature: its potential for malicious use in sophisticated attacks and the vulnerabilities it introduces, presenting challenges for both users and web developers.
Get personalized course recommendations, track subjects and courses with reminders, and more.