Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Software Development
Data Analysis
Computer Science
Mindshift: Break Through Obstacles to Learning and Discover Your Hidden Potential
Understanding the GDPR
Functional Foods and Nutraceuticals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ransomware's impact on manufacturing, learn protection strategies, and gain insights on incident response and OT security from industry experts.
Explore industrial cybersecurity strategies, focusing on safeguarding control systems, enhancing safety uptime, and leveraging advanced platforms for robust incident response and threat management.
Develop a converged IT/OT threat model using MITRE ATT&CK framework to map and prioritize defensive capabilities for unified cyber defense strategy across industrial control systems.
Explore techniques for identifying assets, understanding threats, and guiding incident response in interconnected plant environments to ensure safe and reliable output.
Explore key considerations for effective ICS incident response, including preparation, decision-making, shutdown criteria, root cause analysis, and engaging IR teams for safe and efficient recovery.
Learn to defend critical infrastructure using OSINT collection risk framework. Discover attacker tactics, prevention strategies, and adversary response prediction techniques for enhanced ICS cybersecurity.
Explore strategies for secure digital transformation in industrial operations, focusing on IIoT integration, workforce cybersecurity practices, and OT-specific security measures.
Explore industry perspectives on addressing cyber risks in manufacturing, securing digital transformation, and deploying IIoT initiatives safely and effectively.
Explore cybersecurity strategies for manufacturing, including technology options, program building, and ransomware protection. Learn to navigate digital transformation challenges and enhance security measures.
Explore threat activity groups in ICS cybersecurity: identification, analysis, and importance. Learn about models, lifecycles, and attribution challenges with industry experts.
Explore key strategies for building a robust OT cybersecurity program, focusing on five critical controls to assess maturity, align resources, and protect industrial assets from evolving cyber threats.
Explore cybersecurity threats to industrial control systems, learn key differences between IT and OT security, and discover strategies to enhance cyber defense in the chemical industry.
Explore global OT cybersecurity trends, CHERNOVITE's PIPEDREAM, and strategies for industrial teams to defend against sophisticated cyber threats in this informative fireside chat with industry experts.
Explore collective defense strategies for ICS security through Neighborhood Keeper, facilitating community communication and assistance for enhanced threat visibility and incident response.
Explore key differences between IT and OT cybersecurity, focusing on unique challenges in industrial control systems and strategies for aligning people, processes, and technology.
Get personalized course recommendations, track subjects and courses with reminders, and more.