Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Information Technology
Digital Marketing
Six Sigma Part 1: Define and Measure
Know Thyself - The Value and Limits of Self-Knowledge: The Examined Life
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore blockchain security, private key generation, and vulnerabilities. Learn about scanning techniques, potential exploits, and best practices for protecting digital assets.
Explore IoT hacking techniques and learn effective strategies to secure networks and devices against cyber threats, vulnerabilities, and attacks in various organizational settings.
Explore the DIE Triad (Distributed, Immutable, Ephemeral) as an alternative to CIA, reducing security burden and enabling true resiliency. Learn to apply DIE principles for tackling security, resiliency, and privacy challenges.
Explore a new framework for measuring cybersecurity control value, enabling more effective resource allocation and decision-making in information security management.
Explore tools and techniques of real-world threat actors like OceanLotus/APT32, gaining firsthand insights into cybercriminal operations and enhancing your defense strategies.
Explore cyber resilience strategies, implementation methods, and actionable steps to enhance organizational security through existing programs and meaningful metrics.
Learn to build and effectively use a cybersecurity architecture toolbox, covering analytical, informational, and design tools for successful security planning and implementation.
Explore quantum computing's impact on encryption, including Shor's Algorithm, current quantum tech status, and future implications for cybersecurity. Learn about quantum cryptography and industry developments.
Learn to ask effective questions in security projects, enhancing discovery, planning, and persuasion skills through real-world examples and practical techniques for better communication and project success.
Explore WPA3 and Enhanced Open: advancements in wireless security, their benefits, and implementation strategies for enterprise networks.
Explore the fascinating parallels between honeybee colonies and cybersecurity organizations, learning valuable insights for threat detection, risk assessment, and organizational structure.
Experts discuss shifting focus back to information security, exploring advancements in identity management and encryption to better protect data in an interconnected world.
Explore the U.S. government's vision for cybersecurity resilience, featuring insights from Homeland Security Secretary Mayorkas and a discussion on empowering future generations in the field.
Explore evolving threat landscapes, from nation-state conflicts to sophisticated attacks on individuals and devices. Learn about below-OS mitigations to protect BIOS, firmware, and data.
Explore the rising threat of ransomware in industrial control systems, its impact on critical infrastructure, and strategies to defend against these sophisticated attacks and data theft operations.
Get personalized course recommendations, track subjects and courses with reminders, and more.