Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Management & Leadership
Data Analysis
Cybersecurity
Introducción a la inversión bursátil
Astrobiology and the Search for Extraterrestrial Life
Improving Your Study Techniques
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore real-world anti-forensics techniques employed by threat actors, gaining insights into their methods and strategies for evading detection and analysis.
Dive into the hidden corners of the internet, exploring dark web forums, markets, and scams. Gain insights into this secretive digital underworld and its operations.
Discover advanced OSINT techniques for social media intelligence gathering, focusing on efficient methods to extract valuable information from online platforms.
Explore common SOC team challenges, current solutions, and future strategies for enhancing security operations effectiveness and team cohesion.
Exploring legal protections for ethical hackers, advocating for standardized Safe Harbor language in vulnerability disclosure programs to encourage cybersecurity collaboration without legal risks.
Explore tech-enabled crime and its impact on personal security, with insights on protective measures and emerging threats in the digital age.
Explore a security professional's first-year journey, covering challenges like imposter syndrome, burnout, and continuous learning in the fast-paced cybersecurity field.
Explore techniques for investigating newly registered domains, uncovering potential threats, and enhancing cybersecurity through proactive domain analysis.
Discover the importance of newcomers in InfoSec, addressing skills shortages, diversity, and stakeholder management while exploring strategies to attract and retain talent.
Discover effective strategies to transition from training to marketing, focusing on essential techniques for impactful communication and audience engagement.
Explore threat actor tracking through a beginner's perspective, covering setup, tools, and techniques for identifying and analyzing malicious activities.
Discover real-world techniques for compromising computer security in public spaces, exploring vulnerabilities and ethical considerations in Wi-Fi networks.
Explore effective strategies for identifying and managing business risks to enhance organizational resilience and decision-making.
Explore key traits for success in cybersecurity: curiosity, generosity, perseverance, confidence, optimism, and gratitude. Gain insights from industry expert James Hickie.
Explore car hacking risks and techniques, including USB exfiltration, wireless vulnerabilities, and CAN bus manipulation in modern vehicles.
Get personalized course recommendations, track subjects and courses with reminders, and more.