Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical techniques for new security managers, covering essential practices, coaching, delegation, and leadership skills to excel in management roles and deliver outstanding value.
Discover how AI transforms cloud-native security through automated threat detection, vulnerability assessment, and defense against AI-powered attacks in DevSecOps pipelines.
Explore emerging threats in mobile computing, covering device security, data protection, attack surfaces, and interception techniques. Learn about risks and mitigation strategies for smartphones and cellular networks.
Discover practical AI implementation strategies from a senior project manager's real-world experience across banking, government, and healthcare sectors.
Discover how kanban and kanban-style standups bring order to chaotic reactive work environments while being gentle on teams.
Discover how curiosity transforms incident response effectiveness when resources are limited, moving beyond perfect workflows to practical strategies for real-world security challenges.
Navigate the cybersecurity certification landscape with expert guidance on choosing the right credentials, avoiding pitfalls, and building a strategic career plan in security.
Explore the differences and complementary roles of WAF and RASP in application security, understanding their strengths and limitations for comprehensive protection.
Explore API security challenges, threats, and enterprise-scale solutions. Learn about modern attack surfaces, recent breaches, and effective strategies for protecting sensitive data in API-driven architectures.
Explore privacy impact assessments, their methodologies, and how they differ from security risk assessments. Learn to model and measure privacy impacts for effective Privacy by Design implementation.
Explore WAF options, features, and challenges across cloud providers and self-managed solutions for enhanced web application security and defense-in-depth strategies.
Discover how to revolutionize your AppSec program through effective communication, prioritization, and innovative strategies for securing software development.
Learn to create, manage, and grow an OWASP project. Explore naming, sponsorship, levels, services, and resources for successful open-source security initiatives.
Innovative approach to creating effective security policies that are easy to understand, implement, and comply with, improving overall organizational security and employee engagement.
Learn to build an enterprise threat modeling program using the Threat Modeling Manifesto. Discover key principles, benefits, and practical tips for implementing effective security practices across your organization.
Get personalized course recommendations, track subjects and courses with reminders, and more.