Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore Azure Log Analytics exploitation as a covert channel, uncovering potential security threats in cloud logging infrastructure and learning mitigation strategies.
Explore a platform for automated code scanning and vulnerability data streaming, designed to provide developers with fast, timely information on potential security issues.
Comprehensive guide to adversary simulations in GCP, covering initial access, persistence, privilege escalation, C2 using Google products, and data exfiltration techniques.
Explore strategies for creating effective security products by prioritizing usability, leading to better and more secure experiences for users.
Guidance for pioneering security professionals on establishing a robust security program, integrating it into company culture, and balancing protection with business needs.
Explore a sophisticated cyber-attack targeting Asian institutions, dissecting its modules, capabilities, and impact on victims' data in this in-depth analysis of Operation PZCHAO.
Explore reverse engineering of Logitech's Harmony smart home hub, uncovering vulnerabilities and discussing their implications for device security and potential exploitation.
Learn to build a custom cloud-based email IDS to combat phishing, enhancing security while improving operational efficiency. Explore real-time threat adaptation and AWS implementation.
Explore DNS vulnerabilities, their historical impact, and potential future threats in this comprehensive overview of attack techniques and pentesting applications.
Explore automated detection of Exploit Kits using headless browsers, JavaScript, and DOM inspectors for efficient web crawling and analysis of malware delivery techniques.
Explore Windows kernel debugging essentials, including symbol servers, BSOD analysis, and live debugging. Learn practical approaches to diagnose CPU issues, deadlocks, and blue screens for improved software security.
Get personalized course recommendations, track subjects and courses with reminders, and more.