Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how Natural Language Processing and Word2Vec can organize unstructured cybersecurity intelligence, making it actionable by mapping to frameworks like MITRE ATT&CK.
Explore the evolution of online identity security, from U2F to FIDO2, and learn how open standards are shaping the future of passwordless authentication across devices.
Comprehensive guide on implementing two-factor authentication for large-scale websites, covering design, architecture, and various methods like TOTP, push notifications, and FIDO security keys.
Practical insights on creating and improving application security programs, drawing from 20 years of experience across various sectors. Covers successful strategies and pitfalls to avoid.
Explore penetration testing dropboxes: types, setup, and attacks. Learn how these tools simulate internal threats, uncover security gaps, and benefit both red and blue teams in enterprise environments.
Explore WCF vulnerabilities in .NET programs, focusing on privilege escalation and remote code execution. Learn to identify and exploit these bugs through a real-world case study.
Explore built-in security tactics for Kubernetes and Docker, including automated configurations, read-only filesystems, and limiting cross-container communications to enhance service security.
Interactive presentation on orchestrating cyber security incident tabletop exercises, focusing on "assume breach" scenarios and guiding participants through simulated timelines and decision-making processes.
Explore Lyft's open-source security intelligence platform for asset tracking, relationship mapping, and automated decision-making. Learn how it improves visibility and empowers teams to enhance security posture.
Explore Go malware's unique characteristics, metadata analysis techniques, and insights into malware authorship through examination of stripped Go binaries and their structural elements.
Innovative real-time analysis technique for detecting compromised privileged accounts using Kafka streaming, enabling scalable, per-account risk assessment and evolving individual risk profiles.
Insights on transitioning from engineering to management in security, addressing challenges, self-doubt, and maintaining technical relevance while developing leadership skills and fostering a collaborative team culture.
Explore Android enterprise security features, threats, and best practices for protecting users in organizations. Learn how Google implements these measures and where to begin enhancing your security.
Explore strategies to address the cybersecurity diversity gap, examining unconscious bias, underrepresented experiences, and actionable steps to increase and retain qualified candidates from diverse backgrounds.
Explore blue team strategies for comprehensive data collection, analysis, and correlation using open-source tools and machine learning to enhance continuous monitoring capabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.