Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore essential security concepts for generative AI and LLMs, understanding both traditional cybersecurity approaches and emerging threats in this evolving technological landscape.
Discover how to break into Industrial Control Systems (ICS) cybersecurity, exploring career paths, debunking myths, and gaining practical insights for protecting critical infrastructure.
Discover how to transform traditional Security Operations Centers into agile, next-generation entities capable of addressing modern cyber threats and future challenges through practical, actionable steps.
Dive into North Korean APT group Lazarus's cyber-kill chain tactics, examining their MagicRAT malware and attack strategies against global energy companies through detailed MITRE ATT&CK analysis.
Discover how to simplify cybersecurity approaches by avoiding tool overload and focusing on effective, streamlined solutions for better threat management and user experience in modern security programs.
Discover proactive cybersecurity strategies for better risk decisions, focusing on preventative measures over reactive controls. Learn to identify vulnerabilities, assess business impact, and implement effective risk mitigation techniques.
Discover practical cybersecurity strategies for small businesses, from playbook development to threat intelligence, using cost-effective resources and proven methodologies.
Discover a flexible framework for coordinating incident response teams, improving support structures, and developing staff capabilities during security incidents.
Gain insights into cybersecurity career entry through the unique perspective of a 17-year-old professional, covering industry challenges, recommendations, and pathways for aspiring security experts.
Discover the fascinating story of Elizebeth Smith Friedman, pioneering cryptologist and Nazi spy hunter, while exploring cryptography's evolution and its modern technological implications.
Gain insights into CVSS scoring systems and CVE categorization, learning fundamental approaches to assess and communicate vulnerability severity across organizations.
Discover modern Windows rootkit detection techniques, memory forensics, and event log analysis methods to combat evolving kernel-level malware threats in Windows 10 and beyond.
Discover how to assess and enhance zero trust architecture using CISA's Maturity Model, with practical insights from Centers for Medicare and Medicaid Services' implementation framework and tracking methods.
Discover prevalent cybersecurity vulnerabilities and defense strategies through real penetration testing insights, focusing on authentication flaws, network poisoning, and emerging threats in modern security landscapes.
Discover how incident response frameworks parallel grief recovery stages, offering unique insights into managing personal loss and emotional healing processes.
Get personalized course recommendations, track subjects and courses with reminders, and more.