Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Expert guidance on CSSLP exam preparation, covering exam parameters, strategies, and key domains. Learn essential tips to excel in this prestigious application security certification.
Explore Azure Storage Account security, authentication methods, and automated key rotation in this comprehensive webinar. Learn about key vaults, event grids, and Azure functions for enhanced cloud storage management.
Comprehensive overview of IBM QRadar's key components, functionality, and importance in cybersecurity. Covers threat detection, incident response, and platform capabilities for effective security intelligence.
Explore CRISC certification: exam prep, benefits, and key domains. Expert insights on governance, risk assessment, response, and IT security for aspiring professionals in information systems control.
Master ethical hacking skills and prepare for CEH certification with a comprehensive overview, key domain practice, and exam strategies. Gain insights into reconnaissance, scanning, and web application hacking.
Master TCP communication flags, network scanning fundamentals, and NMAP tool operations for effective penetration testing and ethical hacking. Learn to identify live hosts and vulnerabilities in networks.
Discover how red teaming simulates real-world cyber attacks to strengthen organizational security, from initial reconnaissance to exfiltration, while exploring team dynamics and defensive strategies.
Discover the fundamentals of ethical hacking, different hacker types, and penetration testing methodologies to launch your career in offensive security and protect digital systems effectively.
Master the 7-step implementation process for AI Management Systems (AIMS) aligned with ISO 42001, covering risk assessment, policy development, and governance structures for effective AI management.
Explore emerging DevSecOps trends and predictions for 2025, focusing on security integration, automation, and evolving cyber threat responses in agile development environments.
Master proven strategies and essential techniques for CISM certification success, covering exam preparation, domain expertise, and effective time management across all four CISM domains.
Explore the 12 fundamental domains of cloud security covered in CCSK v5, from governance and compliance to data protection and incident response strategies.
Explore essential cloud security components including encryption, IAM, data governance, compliance, and incident response to build robust protection strategies for cloud infrastructure.
Discover essential cloud security principles and practices, from encryption and IAM to incident response, ensuring robust protection for your cloud infrastructure and sensitive data.
Master essential cryptography concepts and security fundamentals, from encryption methods to infrastructure protection, enabling you to understand and implement secure communication systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.