Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Develop a holistic strategy for cloud security with advanced monitoring, threat intelligence, and adaptive incident response to address evolving challenges.
Discover strategies to overcome key Zero Trust challenges while achieving security consolidation, improving SOC efficiency, and addressing integration gaps.
Explore modern PKI for proven security and identity at scale, covering IoT, in-country, on-prem, and hybrid landscapes. Learn cloud transformation fundamentals.
Explore modern authentication requirements and Zero Trust Authentication to address rising credential-based breaches and MFA vulnerabilities in corporate security.
Explore FedRAMP's dynamic evolution, its impact on cloud security, and how adopting common controls frameworks can streamline compliance efforts for cloud service providers.
Explore techniques for class imbalance, explainability, and best practices in machine learning for threat classification modeling.
Explore latest cloud security research, focusing on identity and supply chain risks. Examine evolving threats and recent breaches based on CSA's comprehensive report.
Explore subdomain takeover, bug bounty, and cloud security in this exclusive session led by industry expert Satish Govindappa.
Embark on your Zero Trust journey, understanding its importance, prerequisites, and role in cloud migration. Gain insights to implement this crucial security approach in your organization.
Discover how CNAPPs revolutionize cloud security, unifying fragmented stacks and empowering engineers to address critical risks efficiently. Learn implementation strategies for evolving your security program.
Discover automated solutions for securing multi-cloud applications and workloads. Learn steps to improve security posture and explore Fortinet's edge-to-edge protection approach.
Explore how AI transforms security strategies through synthetic data, agents, and RAG technologies, while learning to leverage these tools for enhanced enterprise defense and protection.
Discover essential security strategies for ML model hubs, focusing on detecting Model Serialization Attacks and implementing cryptographic signing to protect against compromised artifacts and system vulnerabilities.
Explore how AI resilience combines regulatory compliance with diverse, adaptable solutions through a biological analogy, emphasizing standardization and specialized modifications for optimal performance.
Explore how DevOps teams can adopt security tactics and leverage AI for better cloud defense, while building diverse teams to strengthen organizational cybersecurity posture.
Get personalized course recommendations, track subjects and courses with reminders, and more.