Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Gain valuable insights on interviewing dos and don'ts from an experienced hiring manager's perspective, enhancing your chances of success in the job market.
Explore the challenges of code signing for open source developers, addressing outdated mechanisms and high costs while examining the complexities and frustrations involved in the process.
Explore current security hiring trends, including top-paying industries, in-demand skills, and strategies for landing interviews and securing job offers in the evolving tech landscape.
Explore a case study on detecting supply chain threats through anomaly detection in Cloud API logs, offering insights into advanced cybersecurity techniques.
Explore OpenSSF Scorecard, an automated tool assessing software security heuristics. Learn how it evaluates dependencies and identifies areas for improving security posture in open source projects.
Expert panel discusses transitioning from Senior to Staff+ engineering in security, offering insights on career advancement and answering audience questions about high-level roles in cybersecurity.
Explore the dual nature of Certificate Transparency Logs in Web PKI: their role in ensuring certificate authenticity and potential misuse by malicious actors for reconnaissance.
Discover Segment's innovative approach to safeguarding API keys, addressing the critical issue of secret leaks on GitHub and enhancing overall security for user data and actions.
Learn to develop a comprehensive endpoint security program to protect your organization's internal resources and data from potential threats and compromised devices.
Insights on creating a Privacy Operations Center in digital healthcare, addressing global regulations and overcoming challenges in data protection and compliance.
Discover techniques for finding, rotating, and safely managing secrets in applications. Learn best practices for secure secret storage and handling compromised credentials.
Deep dive into building a scalable, lean threat detection pipeline. Learn automation techniques for data ingestion, detections-as-code, and filtering to create a serverless platform for effective threat detection.
Explore cyber threat intelligence as a solution for managing the rapidly expanding threat landscape, prioritizing threats, and providing actionable insights to decision-makers in enterprise security.
Explore modern sandboxes and isolation primitives for enhanced security. Learn when and how to use containment tools, with practical insights for immediate implementation.
Learn to develop proactive Command & Control (C2) threat detections using automated offensive security techniques. Explore push-button infrastructure for simulating complex attacker behaviors and generating high-fidelity signals.
Get personalized course recommendations, track subjects and courses with reminders, and more.