Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced software supply chain security strategies, focusing on risk assessment, contributor profiles, project dynamics, and integrating security into deployment pipelines.
Explore tactics and techniques of supply-chain attacks on Python open-source software, including starjacking, installation, delivery, and exfiltration. Learn defensive strategies against these threats.
Explore essential cybersecurity domains, from compliance to hacking, and understand their importance in developing comprehensive security strategies for modern organizations.
Explore TTP-based threat hunting with the Pandora Project. Learn about tailored defensive solutions, methodology workflows, and practical use cases for detecting known unknowns in cybersecurity.
Explore Kubernetes secrets management techniques, including GitOps, sealed secrets, external secrets, and Vault integration. Learn best practices for securing sensitive data in containerized environments.
Learn to identify and remove sensitive information from Git repositories, understanding risks and implementing effective defense strategies.
Explore hacking demos, asset intelligence, and XIoT vulnerabilities. Learn about common attack types, see live industrial device hacks, and discover remediation strategies for enhanced cybersecurity.
Explore supply chain attacks focusing on NPM, learn defensive strategies, and discover research findings on vulnerabilities in package ecosystems. Gain insights into detection tools and solutions.
Enhance memory skills for business success with techniques from a U.S. Memory Champion. Learn practical strategies to boost recall and improve professional performance.
Explore key capabilities driving software delivery improvements, focusing on continuous delivery, built-in quality, security, and operability. Learn to architect for DevOps and platform engineering at scale.
Explore the evolution of authorization systems, from basic roles to decoupled attribute-based access control (ABAC), addressing scalability and compliance challenges in modern software development.
Explore Kubernetes workload security using Istio Service Mesh. Learn about architecture, authentication, authorization, and see practical demonstrations for implementing robust security measures.
Explore cloud security challenges, container vulnerabilities, and DevSecOps strategies. Learn automated vulnerability management, configuration best practices, and network segmentation for enhanced protection.
Explore Kafka governance simplification using Klaw. Learn about architecture, approval processes, and practical demonstrations for efficient Kafka management in DevSecOps environments.
Explore AI and ML applications in business, focusing on Oracle's tools for database management, analytics, and generative AI. Learn about algorithms, AutoML, and the future of AI in various industries.
Get personalized course recommendations, track subjects and courses with reminders, and more.