Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to efficiently map AI security frameworks to existing cloud security controls, streamline compliance reporting, and identify gaps in MLSecOps across major cloud providers.
Discover how to implement secure emergency admin access in AWS using smart cards, x.509 certificates, and Yubikey PIV mode for robust disaster recovery solutions.
Discover how to leverage AWS Access Analyzer for threat detection by creating behavioral baselines, analyzing risk patterns, and implementing SIEM-agnostic hunting techniques across cloud environments.
Discover essential security controls and implementation strategies for cloud infrastructure, drawing insights from Google's Borg system and applying them to GCP or custom deployments.
Discover critical security insights for Amazon EKS environments through real-world examples, common misconfigurations, and practical mitigation strategies from experienced cloud security researchers.
Discover how on-premise security vulnerabilities can compromise cloud environments through real incident response cases, focusing on network security, access management, and logging best practices.
Discover how the HoneyCloud project detects and analyzes cloud-based cyber threats, exploring real-world cases of cryptojacking, P2P worms, and ransomware attacks targeting cloud environments.
Discover a practical methodology for AWS penetration testing, focusing on integrating diverse attack techniques and addressing critical gaps in cloud security assessment approaches.
Dive into Azure security fundamentals through a real-world control plane bypass case study, exploring RBAC, permission controls, and critical security measures for robust cloud environment protection.
Discover how to build secure, zero-configuration multi-cloud environments using identity automation and sidecar containers for seamless resource access across AWS, Azure, and Google Cloud platforms.
Delve into AWS security vulnerabilities and attack techniques, focusing on trust relationships, IAM roles, and service misconfigurations. Learn defensive strategies against emerging cloud security threats.
Dive into GCP authentication mechanisms and audit logs to effectively identify principals, track access tokens, and enhance cloud security monitoring through practical demonstrations and real-world scenarios.
Explore the security challenges and solutions for managing cross-cloud access, focusing on authentication mechanisms, potential vulnerabilities, and practical strategies for protecting multi-cloud environments.
Discover how to create and implement an internal shared responsibility model for cloud security, drawing insights from Booking.com's journey in optimizing AWS resource protection and team collaboration.
Discover a Python-based pentesting framework for Google Cloud Platform, featuring enumeration modules for core services and exploit capabilities designed for security professionals and researchers.
Get personalized course recommendations, track subjects and courses with reminders, and more.