Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how locks, surveillance systems, barriers, and access control mechanisms work together to create robust physical security measures for protecting organizational assets.
Explore emerging DevSecOps trends and predictions for 2025, focusing on security integration, automation, and evolving cyber threat responses in agile development environments.
Master proven strategies and essential techniques for CISM certification success, covering exam preparation, domain expertise, and effective time management across all four CISM domains.
Explore essential cloud security components including encryption, IAM, data governance, compliance, and incident response to build robust protection strategies for cloud infrastructure.
Explore the key differences between ISO Lead Auditor and Lead Implementer roles, comparing responsibilities, required skills, and career opportunities to help choose your ideal career path.
Comprehensive overview of IBM QRadar's key components, functionality, and importance in cybersecurity. Covers threat detection, incident response, and platform capabilities for effective security intelligence.
Master the step-by-step process of creating and configuring Azure Virtual Networks with practical examples and expert optimization techniques for building robust cloud networking foundations.
Explore the latest advancements in CEH v13 AI, including AI-powered tools for vulnerability detection, automated threat analysis, and enhanced penetration testing techniques for modern cybersecurity challenges.
Discover the essential responsibilities of SOC Analysts, from threat detection and monitoring to incident response procedures and proactive security measures in cybersecurity operations.
Master the key metrics of threat detection in SOC operations by understanding True Positives, True Negatives, False Positives, and False Negatives - essential concepts for effective security monitoring and analysis.
Master essential strategies for CISM certification covering governance, risk management, program development, and incident management domains with expert tips for exam success.
Master advanced penetration testing techniques used by ethical hackers to simulate attacks, uncover vulnerabilities, and test security measures through network reconnaissance, exploitation, privilege escalation, and post-exploitation analysis.
Master Business Continuity & Disaster Recovery concepts for cybersecurity interviews, including BCP vs. DRP, RTO/RPO metrics, backup strategies, and real-world scenarios to help you respond confidently to Domain 2 questions.
Dive into SailPoint's identity governance platform with a hands-on demo showcasing automated provisioning, policy management, and role-based access control, while exploring career opportunities and advancement paths in IAM.
Master IT risk assessment methodologies, enterprise frameworks, and mitigation strategies for the CRISC certification. Gain practical insights to identify, analyze, and address IT risks while aligning with business objectives.
Get personalized course recommendations, track subjects and courses with reminders, and more.