Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical guidance on initial steps to take during a cybersecurity incident, including data collection, communication strategies, and common pitfalls to avoid when responding to a breach.
Explore how educational technologies impact student privacy, examining the risks of data-intensive tools in classrooms and discussing ways hackers can help protect students' personal information.
Explore security challenges and solutions for emergency response networks, from Hurricane Katrina to the Ebola crisis. Learn how to protect vital connectivity in disaster zones.
Uncover deceptive statistical practices in information security reports. Learn to identify manipulated data, misleading charts, and logical fallacies to critically evaluate security-related statistics and research findings.
Explore cloud-based intrusion detection strategies for shared hosting environments, addressing security challenges and implementing effective monitoring solutions.
Explore insights from building the world's largest crowdsourced honeynet. Learn about deploying diverse honeypots globally, analyzing security data, and creating a distributed sensor network for tracking threats.
Explore collective action challenges in cybersecurity with Allan Friedman, examining strategies for improved collaboration and shared responsibility in addressing digital threats.
Explore HIPAA compliance strategies, focusing on IT and Legal collaboration, documentation, and security risk assessment to prepare for increased federal audits and protect health information.
Practical strategies for protecting online privacy and resisting mass surveillance through encryption and privacy technologies. Learn to safeguard your digital rights and opt out of bulk data collection.
Discover strategies for bridging the gap between security and development teams, fostering a collaborative approach to cybersecurity in organizations.
Explores the importance of human-driven cybersecurity analysis over automated tools, emphasizing the need for skilled analysts to detect and counter human adversaries effectively in information security.
Explore digital civil liberties with EFF experts, covering surveillance, intellectual property, privacy, and security research. Gain insights on law and technology issues through Q&A.
Explores strategies to improve public perception of the infosec community, addressing misconceptions and highlighting positive contributions through effective media engagement and reputation management.
Explore GitReview, a lightweight GitHub overlay for auditing repositories while maintaining developer flexibility and ensuring security, peer review, and approval.
Explore DNS query patterns to identify potential threats using unsupervised learning methods. Learn to analyze traffic trends and distinguish malicious domains from benign spikes.
Get personalized course recommendations, track subjects and courses with reminders, and more.