Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ICS-specific OSINT techniques and freely available data used by adversaries in attacks. Learn to decrease attack surface and increase adversary friction in industrial control systems.
Discover the role of expert witnesses in litigation, learn how to become one, and gain insights into the skills needed for effective testimony in legal proceedings.
Explore Reddit's implementation of a graph-based CMDB for cloud security governance, including visibility gains, implementation journey, and the power of centralized configuration data aggregation.
Explore the future of data protection, privacy regulations, and organizational responses. Gain insights into managing privacy risks and upcoming issues shaping business behavior.
Comprehensive overview of 4G and 5G network security, covering architectures, potential threats, and enhancements. Explores virtualization implications and future security activities in mobile networks.
Discover best practices for writing secure code, focusing on business-driven approaches, understanding your model, and integrating security seamlessly into development processes.
Experts discuss practical applications of MITRE ATT&CK framework, sharing insights on improving cybersecurity operations, leveraging adversary knowledge, and enhancing organizational defense strategies.
Insights from former NSA and Israeli Intelligence leaders on cybersecurity challenges, leadership strategies, and public-private collaboration in an increasingly connected world.
Explore Google's "BeyondCorp" framework for cloud-era security, enabling seamless remote work without VPNs through a "Zero Trust" approach and user-centric access controls.
Explore Trusted Execution Environments for secure data processing in public clouds, including architectures, runtimes, and tools for creating confidential computing services.
Explore cyber-resilience strategies in an uncertain world, integrating human expertise with machine learning for effective security orchestration and incident response.
Explore Dell's innovative approach to cybersecurity workforce development, focusing on job role assessments and tailored training paths to address skill gaps and create effective career pathways.
Enhance SOC visibility and threat hunting using open-source tools. Learn network blueprinting, automation techniques, and advanced data analysis for effective cybersecurity operations.
Explore user-centric approaches to security design, balancing usability and protection. Learn key strategies for creating intuitive, effective security systems that empower users to control their data.
Explore innovative approaches to cybersecurity beyond threat detection, focusing on reducing attack surfaces and empowering defenders with proactive strategies and application-aware solutions.
Get personalized course recommendations, track subjects and courses with reminders, and more.