Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into the intricacies of the Neutrino Exploit Kit, exploring its mechanisms, vulnerabilities, and impact on cybersecurity. Gain insights into advanced malware analysis techniques.
Strategies for achieving and sustaining compliance while maintaining positive relationships. Learn effective communication and collaboration techniques to implement security measures without causing friction.
Explore cybersecurity's impact on public safety and policy with experts from I Am The Cavalry. Gain insights into the intersection of technology, governance, and societal well-being.
Explore the 30-year history and impact of the Computer Fraud and Abuse Act (CFAA) with legal experts, examining its evolution, controversies, and implications for cybersecurity and digital rights.
Open-source penetration testing reporting and automation techniques to streamline security assessments and improve efficiency in identifying vulnerabilities and communicating findings.
Explore deep learning's role in cybersecurity, focusing on adversarial architectures for malware detection and generation. Learn about vulnerabilities, red team modeling, and defensive strategies.
Explore storage security beyond servers, focusing on protecting data at rest and in transit. Learn key concepts and best practices for safeguarding critical information assets.
Inspiring talk on ethical hacking's potential to drive positive change in cybersecurity, encouraging hackers to become heroes by going beyond traditional boundaries and making a meaningful impact.
Explore modern password security practices, including composition rules, storage methods, and authentication alternatives, to enhance digital identity protection.
Explore data science concepts applied to information security, learning practical techniques without advanced degrees. Gain insights into leveraging data for enhanced cybersecurity.
Explore continuous discovery, scalability, and human monitoring in cybersecurity with the OWASP Assimilation Project. Learn about architecture, attack surface analysis, and practical demonstrations.
Learn to implement Network Access Control effectively, involving various teams and overcoming challenges. Gain insights on recruiting allies, achieving quick wins, and troubleshooting common issues.
Explore the flaws in password surveys and their impact on security practices. Learn about better approaches to assess and improve password policies.
Explore advanced observability techniques for enhanced security and privacy, moving beyond traditional logs and time series data to improve threat detection and investigation.
Explore cyber hygiene services, software bill of materials, and sector-specific advice for resource-constrained organizations. Learn about challenges and solutions in cybersecurity for critical infrastructure.
Get personalized course recommendations, track subjects and courses with reminders, and more.