Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore insights from building the world's largest crowdsourced honeynet. Learn about deploying diverse honeypots globally, analyzing security data, and creating a distributed sensor network for tracking threats.
Explore collective action challenges in cybersecurity with Allan Friedman, examining strategies for improved collaboration and shared responsibility in addressing digital threats.
Practical strategies for protecting online privacy and resisting mass surveillance through encryption and privacy technologies. Learn to safeguard your digital rights and opt out of bulk data collection.
Discover strategies for bridging the gap between security and development teams, fostering a collaborative approach to cybersecurity in organizations.
Explores the importance of human-driven cybersecurity analysis over automated tools, emphasizing the need for skilled analysts to detect and counter human adversaries effectively in information security.
Explore digital civil liberties with EFF experts, covering surveillance, intellectual property, privacy, and security research. Gain insights on law and technology issues through Q&A.
Explores strategies to improve public perception of the infosec community, addressing misconceptions and highlighting positive contributions through effective media engagement and reputation management.
Explore GitReview, a lightweight GitHub overlay for auditing repositories while maintaining developer flexibility and ensuring security, peer review, and approval.
Explore DNS query patterns to identify potential threats using unsupervised learning methods. Learn to analyze traffic trends and distinguish malicious domains from benign spikes.
Explore OSXCollector, an open-source toolkit for automated forensic evidence collection and analysis on OS X, streamlining incident response processes for digital investigators.
Learn how certificate pinning in mobile apps can bypass security controls and explore solutions for inspecting encrypted traffic to prevent data exfiltration and attacks.
Explore how educational technologies impact student privacy, examining the risks of data-intensive tools in classrooms and discussing ways hackers can help protect students' personal information.
Explore HIPAA compliance strategies, focusing on IT and Legal collaboration, documentation, and security risk assessment to prepare for increased federal audits and protect health information.
Explore AI voice cloning and its impact on voice authentication systems. Learn voice cloning techniques and discuss trends in voice security.
Explore Netflix's evolving identity-based zero trust architecture, from novel solutions to off-the-shelf tools, emphasizing context over control in workforce security.
Get personalized course recommendations, track subjects and courses with reminders, and more.