Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover the AI Controls Matrix (AICM v1.0), a vendor-neutral framework with 243 control objectives across 18 domains for securing and governing cloud-based AI systems at scale.
Discover how AI agents are transforming security leadership from data protection to decision safeguarding, featuring real-world AI governance insights and trust-building strategies.
Discover practical strategies to manage cloud security alerts based on analysis of 3.9M+ alerts, including how to address common misconfigurations, reduce dwell times, and prioritize high-impact vulnerabilities.
Discover how Raj Samani, SVP and Chief Scientist at Rapid7, shares insights on managing cyber risk in the modern era and best practices for protecting cloud assets against democratized zero-day threats.
Explore cloud-native security challenges and solutions, from container misconfigurations to AI-enhanced threat detection. Learn strategies for building adaptive defenses across application, cloud infrastructure, and security operations centers.
Explore the evolving threats to digital asset custody as attackers exploit technical and regulatory gaps, with insights on how DORA and MiCA regulations are reshaping EU compliance requirements for crypto platforms.
Explore how quantum computers threaten cybersecurity with Bruno Huttner from ID Quantique, who shares best practices for protecting cloud assets against emerging quantum threats.
Explore CTID's threat modeling methodology for critical infrastructure through a case study of Sandworm's attack on Ukraine's power plant, examining tactics and techniques used to exploit vulnerabilities in IT and OT environments.
Discover how understanding security findings in context across workloads, infrastructure, identities, and data helps prioritize real risks in cloud environments, moving beyond acronyms to implement effective security strategies.
Discover the fifteen essential control specifications for Cloud Service Providers to secure physical infrastructure and protect against unauthorized access and environmental hazards in data centers.
Discover how to enhance AI safety using Prisma AIRS technology with insights from Palo Alto Networks and the Cyber Security Academy in this comprehensive security webinar.
Explore AI's dual role in cybersecurity: enhancing threat intelligence, amplifying defensive and offensive capabilities, and reshaping the cyber risk landscape. Learn strategies for leveraging AI in risk mitigation and resilient operations.
Develop proactive strategies for ethical AI deployment, addressing cyber risks and regulatory compliance while gaining a competitive edge in the era of Generative AI.
Explore authorization best practices for LLM-based systems, covering security implications, design patterns, and robust solutions for various use cases.
Learn to secure AI and ML systems by integrating security into the Machine Learning lifecycle, leveraging DevSecOps principles to create a robust MLSecOps framework.
Get personalized course recommendations, track subjects and courses with reminders, and more.