Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore UEFI firmware vulnerabilities, recent security breaches, and the growing threat landscape. Gain insights into potential widespread security lapses in BIOS protection.
Explore the rise of ransomware, its revenue model, and tracking methods. Learn about Bitcoin usage, victim payments, and evolving cybercrime tactics in this comprehensive analysis.
Análisis cuantitativo del impacto de las restricciones chinas en la divulgación de vulnerabilidades de software, examinando su efecto en productos propietarios y de código abierto.
Explore vulnerability intelligence, analyzing 10 years of data to improve prioritization and mitigation strategies for security specialists navigating the complex landscape of weaknesses.
Explore real-world cybersecurity challenges and solutions with insights from a seasoned security officer, offering practical perspectives on industry trends and best practices.
Explore essential strategies for global network recording to enhance cybersecurity. Learn about threat landscapes, Netflow, forensics, and cost-effective solutions for improved security posture.
Explore ransomware mid-game tactics, attacker strategies, and defensive measures to strengthen your security posture against evolving threats in this informative discussion.
Explore how AI and data analytics are revolutionizing cybersecurity, with insights on future trends, human-machine collaboration, and emerging challenges in the field.
Explore the evolving CISO role, its challenges during COVID-19, and the impact of digital transformation with insights from Qualys CISO Ben Carr.
Explore the evolving ransomware threat landscape and learn effective defense strategies from CrowdStrike's VP & GM of Falcon Complete.
Explore strategies to prepare for future supply chain attacks, focusing on controlling key vulnerabilities and leveraging breach and attack simulation techniques.
Explore techniques for identifying hidden vulnerabilities and backdoors in applications, enhancing your ability to secure digital transactions and sensitive data storage.
Explore top container security risks, attack vectors, and best practices for protecting containerized environments in this expert discussion.
Explore the evolving world of extended detection and response (XDR), its potential as a SIEM alternative, and how it enhances security analysts' efficiency in threat detection and response.
Explore how automating incident response enhances security posture, builds team capacity, and cultivates new skills in this insightful discussion with Karl Klaessig of ServiceNow.
Get personalized course recommendations, track subjects and courses with reminders, and more.