Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore modern supply chain security challenges, including hardware and software compromises, adversary motivations, and recent initiatives to address malicious supply chain threats.
Discover how to effectively manage security exceptions at scale through automation strategies, featuring a Fortune 40 healthcare case study on balancing risk and business objectives.
Discover practical strategies for integrating threat intelligence-based purple teaming using MITRE ATT&CK framework to enhance organizational security posture and risk assessment.
Experts share insights on combating evolving DDoS attacks, discussing attacker motivations, methods, and best practices for defending against increasingly complex and frequent threats.
Explore Reddit's implementation of a graph-based CMDB for cloud security governance, including visibility gains, implementation journey, and the power of centralized configuration data aggregation.
Explore ICS-specific OSINT techniques and freely available data used by adversaries in attacks. Learn to decrease attack surface and increase adversary friction in industrial control systems.
Explore SCADA/ICS vulnerabilities, exploitation techniques, and simulated attacks on power grids. Learn about security challenges in industrial systems and strategies for improving defenses.
Explore aviation cybersecurity challenges, global efforts, and cross-sector lessons in this talk on protecting critical systems, ensuring safety, and addressing the expanding digital attack surface.
Discover the role of expert witnesses in litigation, learn how to become one, and gain insights into the skills needed for effective testimony in legal proceedings.
Comprehensive overview of 4G and 5G network security, covering architectures, potential threats, and enhancements. Explores virtualization implications and future security activities in mobile networks.
Explore Mercedes-Benz's approach to cybersecurity for connected cars, including fleet defense strategies and research by 360 Group on vehicle vulnerabilities and attack surfaces.
Explore the future of data protection, privacy regulations, and organizational responses. Gain insights into managing privacy risks and upcoming issues shaping business behavior.
Discover how AI tools can help resource-limited SMBs develop strong business continuity plans, with tailored recommendations that enhance resilience and simplify planning processes.
Explore strategies to address cybersecurity workforce gaps, focusing on essential skills, industry frameworks, and innovative approaches to skills validation in this expert panel discussion.
Experts discuss strategies to address skills and expectations gaps in cybersecurity, offering solutions for both entry-level and experienced professionals to enhance the workforce.
Get personalized course recommendations, track subjects and courses with reminders, and more.