Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Expert insights on building a security program and fostering cybersecurity culture in early-stage companies, covering roadmap creation and team development from scratch.
Explore privilege escalation techniques in Azure's integrated ecosystem. Learn core concepts and advanced attack vectors for enhanced cloud security awareness.
Insights from a backend engineer turned security professional on navigating corporate security, effective communication, and maximizing your new role beyond day-to-day engineering tasks.
Learn to secure self-hosted GitHub runners, mitigate risks of compromised access tokens, and implement key configuration adjustments to protect CI/CD pipelines from potential network breaches.
Explore recent adversarial techniques to protect facial biometrics, including an open-source mobile app demonstration for real-world privacy preservation against facial recognition.
Strategies for effectively communicating complex technical information to diverse audiences, focusing on user motivation and tailored approaches for successful implementation of transformative solutions.
Insights from Discord's implementation of WebAuthn and Yubikeys for enhanced internal security. Learn about challenges, best practices, and lessons learned in deploying FIDO2/WebAuthn as a superior MFA solution.
Expert panel shares insights on becoming a first-time CISO or Head of Security, covering preparation, pursuit, and success strategies for aspiring security leaders.
Uncover the largest credential harvesting campaign: its discovery, impact, and ongoing response. Gain insights into cybersecurity threats and investigative techniques.
Explore sandboxing and isolation as effective alternatives to rapid patching in cybersecurity. Learn strategies to enhance defense without solely relying on immediate updates.
Explore ransomware's evolution from floppy disks to modern cyber threats, uncovering its strange history and valuable lessons for today's cybersecurity landscape.
Explore innovative techniques for enhancing password security and user experience on Pinterest, addressing common password-related challenges in social media platforms.
Learn to deploy cloud-native security controls at scale, using declarative configuration for an automated, self-healing security baseline across multiple cloud environments.
Explore GitHub's bug bounty program, from initial submission to resolution. Learn about the roles of Bug Bounty and PSIRT teams, and gain insights into the incident response process.
Explore the application of NLP in security analysis, focusing on embeddings for insider threat detection and the impact of large language models on the field.
Get personalized course recommendations, track subjects and courses with reminders, and more.