Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive introduction to cybersecurity fundamentals covering information assurance, risk management, security controls, governance, and ethics. Ideal for IT professionals and students seeking entry-level certification.
Explore incident response, business continuity, and disaster recovery concepts to maintain availability of resources and ensure organizational survival during disruptions.
Comprehensive overview of network security fundamentals, covering concepts, threats, infrastructure, and protection strategies for IT professionals and aspiring cybersecurity leaders.
Explore day-to-day security operations, including data protection, encryption, asset management, policies, and security awareness training for effective cybersecurity implementation.
Comprehensive exploration of physical and logical access controls, covering key concepts, administrative measures, and practical implementation for enhancing organizational security.
Explore core security concepts, ethics, controls, asset management, and physical security. Gain essential knowledge for implementing and maintaining robust information security practices.
Explore cryptography's impact on data security, covering techniques like hashing, encryption, and digital signatures. Learn to implement secure protocols and manage keys effectively.
Explore incident response, forensic investigations, and business continuity planning. Learn to identify response policies, support investigations, and contribute to disaster recovery efforts.
Master network security fundamentals through OSI and TCP/IP models, learn to identify threats, implement security controls, and configure protective devices for secure network environments.
Explore authentication methods, trust, identity management, and access control models to ensure secure system and data access for authorized users only.
Explore malware types, countermeasures, and social engineering. Learn endpoint security, mobile device management, and cloud security models. Master virtualization technologies and strategies for secure cloud environments.
Explore risk management for information systems, focusing on continuous maturity modeling, measuring, and monitoring. Learn to identify vulnerabilities, implement frameworks, and analyze security posture in day-to-day operations.
Master essential healthcare cybersecurity strategies to protect patient data, navigate regulations, and implement risk management protocols across medical organizations in this comprehensive 16-hour professional development program.
Master risk management in healthcare settings, focusing on information security, privacy, and patient safety. Learn frameworks, assessment processes, and control procedures for effective risk mitigation and continuous monitoring.
Gain insights into essential cloud concepts, security principles, and implementation strategies. Learn to maintain strong security posture while helping organizations benefit from cloud computing.
Get personalized course recommendations, track subjects and courses with reminders, and more.