Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore open source component risks and mitigation strategies, focusing on supply chain vulnerabilities, recent hacks, and preventive measures through education and automated tooling.
Strategies for career growth in cybersecurity: improving influence, visibility, and promotion chances through effective stakeholder management and asset tracking techniques.
Discover actionable strategies to dramatically enhance your company's security posture without significant financial investment. Learn from distilled insights and lessons from DevSecOps and modern AppSec experts.
Insightful keynote examining the progress and challenges in Information Security over the past decade, highlighting achievements and persistent issues facing professionals in the field.
Explore the modern 2FA landscape with data-driven analysis, comparing security strength and user experience of various authentication methods like SMS, soft tokens, push, and WebAuthn.
Practical advice for security professionals on improving technical writing skills, from starting to finishing, with tools and tips for presenting professional work.
Explore MOSE, a post-exploitation tool for leveraging configuration management servers to compromise associated agents en masse, simplifying large-scale system takeovers.
Explore offensive and defensive scenarios in Kubernetes security, and learn about k-rail, a tool for mitigating risks and managing configurations securely at scale.
Panel discussion with security team leads sharing insights on building and scaling security programs, exploring successes, failures, and practical strategies in DevSecOps implementation.
Comprehensive overview of DevSecOps best practices, tools, and methodologies. Distills insights from industry leaders to help AppSec teams improve security integration, automation, and culture.
Learn to build a cost-effective mobile security workstation using affordable parts and open-source software. Discover how to create a powerful system capable of running Kali Linux or Parrot OS for ethical hacking and network testing.
Discover a framework for building a robust cybersecurity training program that empowers analysts with hands-on skills in incident response, forensics, and threat hunting.
Explore alternative approaches to Active Directory security, focusing on actionable steps for complex multi-domain environments beyond traditional defensive products.
Demonstration of chaining vulnerabilities to remotely exploit a Lenovo NAS device, showcasing command injection, XSS, and CSRF techniques for full system compromise.
Develop effective security exercises using MITRE ATT&CK framework. Learn to create, run, and score drills that turn threat intelligence into practiced action for improved incident response.
Get personalized course recommendations, track subjects and courses with reminders, and more.