Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore big data's role in cybersecurity, focusing on security operations challenges, botnet detection, and innovative hardware solutions for scalable and timely threat detection and remediation.
Explore Scotland's digital strategy, cybersecurity initiatives, and data science efforts for inclusive growth, with insights on engaging youth and supporting educators and public sector.
Explore secure networking strategies for big data environments, covering network architectures, characteristics, and virtualization techniques.
Explore blockchain's potential in verifying educational credentials and employment history, addressing issues of fraud and inefficiency in current systems.
Explore privacy-preserving AI techniques with Andrew Trask, covering differential privacy, federated learning, and shared governance for ethical and secure AI development.
Learn about IOTA, a unique cryptocurrency using a tangled ledger system, exploring its consensus rules, advantages, challenges, and advanced properties like quantum cryptography.
Explore privacy, trust, and cybersecurity challenges in the digital age with Bruce Schneier. Gain insights on encryption, IoT vulnerabilities, and the evolving landscape of threats and defenses.
Explore DNS tunneling, its detection methods, and real-world implications through live examples and analysis techniques.
Explore data protection principles, privacy by design, and stakeholder management in various sectors with expert insights on implementing effective strategies.
Explore the concept of dark data, its retention, and processing, with a focus on personal data and legal compliance in data management.
Explore DNS tunneling, IP addressing, and threat intelligence in cybersecurity. Learn about NetFlow analysis, Windows Defender ATP, and DNS hijacking for enhanced network protection.
Explore evolving frailty concepts, telemetry cycles, and domains like sleep and exercise. Learn about medical networks and device integration for comprehensive health monitoring.
Explore current O365 attack trends, compromise techniques, and defense strategies. Learn about phishing, MFA bypass, and mailbox exploitation to enhance your cybersecurity knowledge.
Explore cyber security landscape, threats, and initiatives with Eamonn Keane. Learn about crime prevention, skills development, and national strategies to combat cyber risks.
Explore scalable use case management in cybersecurity, covering frameworks, metrics, implementation layers, and standardization for effective threat detection and response.
Get personalized course recommendations, track subjects and courses with reminders, and more.