Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to leverage Atomic Red Team for simulating cyber attacks, validating security controls, and improving SOC effectiveness through practical demonstrations and MITRE framework mapping.
Explore AI security challenges and opportunities with tech leader Elissa Shevinsky as she shares insights from her extensive experience in privacy, security, and cryptocurrency sectors.
Dive into container security fundamentals, lifecycle management, and enterprise-level best practices for securing containerized applications in modern development environments.
Discover practical strategies and tools for validating hardware and software integrity, minimizing supply chain risks, and implementing effective security measures across your technology stack.
Explore adversarial thinking techniques in cybersecurity using MITRE PRE-ATT&CK framework to prevent file and data leakage incidents through authentic defensive strategies.
Discover practical network security strategies and tools from a pentester's perspective to strengthen defenses and make attackers' work significantly more challenging and time-consuming.
Dive into the intricate relationship between Active Directory and DNS, exploring security implications, management strategies, and best practices for maintaining a robust directory service infrastructure.
Discover a flexible framework for coordinating incident response teams, improving support structures, and developing staff capabilities during security incidents.
Discover how to transform traditional Security Operations Centers into agile, next-generation entities capable of addressing modern cyber threats and future challenges through practical, actionable steps.
Dive into North Korean APT group Lazarus's cyber-kill chain tactics, examining their MagicRAT malware and attack strategies against global energy companies through detailed MITRE ATT&CK analysis.
Discover how to simplify cybersecurity approaches by avoiding tool overload and focusing on effective, streamlined solutions for better threat management and user experience in modern security programs.
Discover proactive cybersecurity strategies for better risk decisions, focusing on preventative measures over reactive controls. Learn to identify vulnerabilities, assess business impact, and implement effective risk mitigation techniques.
Discover practical cybersecurity strategies for small businesses, from playbook development to threat intelligence, using cost-effective resources and proven methodologies.
Gain insights into cybersecurity career entry through the unique perspective of a 17-year-old professional, covering industry challenges, recommendations, and pathways for aspiring security experts.
Get personalized course recommendations, track subjects and courses with reminders, and more.