Courses from 1000+ universities
Seven years after replacing a Yale president with a fintech CEO, Coursera picks an Amazon veteran to help fix its slowing growth and falling stock price.
600 Free Google Certifications
Computer Science
Communication Skills
Graphic Design
Gamification
Introduction to Mathematical Thinking
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore software design lessons from the Ariane 5 rocket failure, examining testing, validation, and security principles to prevent catastrophic system failures in critical applications.
Discover how to build a secure web server by comparing responses from multiple servers across different operating systems to detect and prevent zero-day exploits and vulnerabilities.
Master essential OSINT techniques and reconnaissance tools to efficiently gather critical intelligence about organizational infrastructure and potential security vulnerabilities without active network engagement.
Master automated password cracking infrastructure setup with Ansible and libvirt/QEMU, focusing on system resilience, snapshots, and rollbacks for optimized hashcat operations.
Explore automated firewall management through Software Defined Networking and SMT solvers, enabling scalable security solutions that integrate with IDS systems without compromising network performance.
Master the art of fuzzer creation and vulnerability discovery, exploring buffer overflow exploitation techniques with hands-on demonstrations and practical exploit development strategies.
Discover how dynamic, short-lived database credentials enhance security and efficiency while minimizing vulnerabilities in database management systems and authentication protocols.
Explore effective strategies for securing and managing IoT and OT networks, addressing challenges in asset inventory, vulnerability assessment, and security control implementation.
Dive into a real-world social engineering case study where an expert demonstrates how he gained unauthorized access to a bank's systems through sophisticated phone manipulation techniques.
Discover essential strategies for protecting your digital footprint from social engineering attacks, learning how pentesters gather public information and implementing effective countermeasures.
Explore security vulnerabilities in medical device communications, focusing on pacemaker systems and practical solutions to protect patient safety and data privacy.
Explore modern supply chain security challenges and solutions through DevSecOps principles, focusing on emerging threats, operational complexities, and practical defensive strategies for today's digital landscape.
Explore the challenges of fragmented threat actor naming conventions and discover how MITRE ATT&CK's framework can help standardize cybersecurity threat research and tracking.
Get personalized course recommendations, track subjects and courses with reminders, and more.