Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Artificial Intelligence
Digital Marketing
Leadership
Crisis Resource Management
Critical Thinking at University: An Introduction
Introducción a la gestión de proyectos
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for exploiting API webhooks, including SSRF attacks that can lead to cloud compromise, and learn about unique attack vectors in modern web services.
Explore the journey of writing and publishing a 400-page security book, from initial concept to final product, with insights into the realities of the process.
Explore Kubernetes lateral movements, identity types, and cluster-to-cloud authentication methods. Learn about real-world misconfigurations leading to cluster takeovers and prevention strategies.
Explore secure QR code frameworks for identity verification, focusing on privacy features that allow selective attribute disclosure. Learn about SMART Health Cards and a new open-source specification.
Explore randomness types, their importance, and applications. Learn about drand, a distributed randomness software, and its role in providing public, verifiable randomness as a service.
Explore passive intelligence gathering through domain squatting, including low-cost techniques, data analysis, and defensive strategies against this cyber threat.
Explores factors influencing password quality across countries, revealing literacy levels and internet usage impact. Aims to understand macrosocial protection factors for adapting password lists.
Exploring Canada's shift from pro-innovation to regulatory approach in Internet policy, covering broadcast, news media, online harms, and privacy regulations. Unpacks recent developments and government plans.
Hands-on workshop exploring APT tactics for privilege escalation and persistence. Learn to develop stealthy implants through 7 labs on Windows process injection techniques.
Hands-on workshop exploring Web Application Firewall bypass techniques, including encoding, SQL injection, protocol switching, and syntax alternatives. Practical exercises with in-depth explanations for each method.
Explore HTTP Request Smuggling attacks, risks, and payloads. Learn to detect and mitigate vulnerabilities in load balancers and proxies. Includes live demonstration and practical mitigation strategies.
Explore strategies to prevent burnout in cybersecurity professionals, improve talent retention, and maintain organizational security through effective mental health support and skill development.
Learn to identify and utilize security metrics that truly matter for effective organizational protection, focusing on improvement and smart resource allocation.
Explore key forensic artifacts in cloud storage services like OneDrive and Dropbox, focusing on data exfiltration detection and acquisition techniques for endpoint investigations.
Exploring the blurred lines between state-sponsored actors, APT groups, and crimeware gangs, challenging traditional classifications and discussing the emergence of second-tier APT categories.
Get personalized course recommendations, track subjects and courses with reminders, and more.