Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore live adversary simulation techniques, enhancing communication between red and blue teams for effective cybersecurity. Learn to perform threat simulations, map APT phases, and implement purple teaming strategies.
Explore OAuth, OpenID Connect, and Open Banking standards in the EU, focusing on security measures, client registration, and API ecosystem development for financial services.
Explore how real-time threat intelligence sharing, automation, and orchestration can enhance cybersecurity efforts and effectively combat attackers in today's digital landscape.
Global privacy experts discuss GDPR implementation, challenges, and future implications for organizations worldwide, focusing on risk management, data practices, and international compliance.
Explore a new cybersecurity model leveraging data gravity for intelligent automation and enhanced decision-making in hybrid cloud environments, replacing traditional SIEM approaches.
Explore best practices for using open-source code securely in critical environments, focusing on DevOps and management strategies for edge, network, and cloud applications.
Exclusive insights into NSA's Cybersecurity Threat Operations Center, covering top threats, best practices for cyber-defense, and emerging technologies like machine learning. Equips audience with actionable strategies for daily operations.
Discover how machine learning models can predict vulnerability exploits with 90% accuracy, enhancing security forecasting and vulnerability management strategies.
Explore 2018 updates to CIS Critical Security Controls, including threat landscape changes, control definition updates, and specific metrics for quantifying cybersecurity measures.
Explore NIST's OSCAL project for standardizing security controls across multiple frameworks, enabling automated assessment and compliance management in IT systems.
Discover the proven system for building elite hacker teams, from talent identification to competition success. Learn surprising strategies for developing top-tier cybersecurity skills and fostering creative problem-solving abilities.
Discover how live hacking demonstrations can engage users, enhance security awareness, and cultivate a proactive cybersecurity culture within organizations.
Discover 10 key strategies for CISO success, including providing business value, gaining stakeholder buy-in, and driving organizational change. Learn to balance technical, operational, and strategic leadership roles.
Explore TIAA's Cyber-Risk Framework: from granular assessments to business-level reporting. Learn policy, standards, quantification, and project lifecycle engagement for effective cyber risk management.
Learn to develop a data-driven security strategy aligned with organizational goals. Explore strategy options, implementation processes, and efficient resource allocation for minimizing friction and maximizing security effectiveness.
Get personalized course recommendations, track subjects and courses with reminders, and more.