Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore threat hunting using MITRE ATT&CK framework against Carbanak malware, covering tactics, techniques, and procedures for effective cybersecurity defense and mitigation strategies.
Explore common pitfalls and solutions for integrating security scanning into CI/CD pipelines, learning from real-world experiences and best practices.
Explore AWS attack techniques and build effective cloud defenses using the ATT&CK framework. Learn to create and operationalize detections for enhanced AWS infrastructure security.
Explore graph-based security analytics with Grapl, leveraging Python for powerful attack detection, behavior analysis, and streamlined investigations in complex environments.
Explore container security, focusing on privileged containers, capabilities, and security contracts. Learn practical demos and admission controller techniques for enhanced protection.
Learn to eliminate static AWS Access Keys using Security Token Service, SAML, and Identity Providers for enhanced cloud security and short-lived credentials.
Explore data analysis and visualization techniques for security through real-world examples, covering various chart types and data transformation methods to enhance security insights.
Experts discuss mental health challenges in infosec, addressing burnout, anxiety, and depression. Offers insights on building supportive cultures and improving workplace well-being.
Discover advanced techniques for creating specialized, custom pretexts in penetration testing, using target-specific data to enhance effectiveness and avoid detection.
Explore strategies for integrating security into DevOps, focusing on the "Three Ways" and providing actionable steps for immediate implementation in your organization.
Explore secure payment networks, KYC/AML practices, and fraud prevention in cryptocurrency exchanges. Learn about Coinbase's strategies for protecting transactions and ensuring regulatory compliance.
Explore how data protection laws like GDPR and CCPA can benefit security teams, informing risk modeling, securing buy-in, and reducing liability exposure for organizations.
Explore the contrasting approaches to information security between Wall Street and Silicon Valley, uncovering valuable insights for professionals across various security roles.
Practical strategies for implementing effective cybersecurity on limited budgets, covering tools, techniques, and cost-saving approaches for organizations with financial constraints.
Explore techniques to differentiate between human-discovered and machine-detected web app vulnerabilities, with insights on manual setup, chain exploits, and real-world case studies.
Get personalized course recommendations, track subjects and courses with reminders, and more.