Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Python
Ethical Hacking
Success: Practical Thinking Skills
Mathematical and Computational Methods
Introduction to Complexity
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for managing access entitlements across multi-cloud environments, addressing security risks and improving governance practices for effective IAM controls.
Explore common Active Directory attacks, prevention strategies, and detection methods. Learn to secure enterprise networks against prevalent hacking techniques and enhance cybersecurity practices.
Explore bio-hacking, bio-implants, and their impact on physical and digital security. Learn about augmented humans, contactless technology risks, and mitigation strategies.
Explore critical flaws in Windows Kernel Patch Protection, learn attack techniques to disable PatchGuard, and discover proposed mitigations for enhanced system security.
Explore ransomware creation, detection, and response strategies. Learn evasion techniques, novel detection methods, and tailored incident response approaches from real-world engagements.
Learn Google's best practices for building secure, reliable systems at scale through automated security, containment, and multi-party techniques that foster a culture of review and resilience.
Develop leadership skills for security teams through actionable strategies, including team building, feedback models, strategic planning, and career management techniques.
Explore blockchain security, private key generation, and vulnerabilities. Learn about scanning techniques, potential exploits, and best practices for protecting digital assets.
Explore IoT hacking techniques and learn effective strategies to secure networks and devices against cyber threats, vulnerabilities, and attacks in various organizational settings.
Explore the DIE Triad (Distributed, Immutable, Ephemeral) as an alternative to CIA, reducing security burden and enabling true resiliency. Learn to apply DIE principles for tackling security, resiliency, and privacy challenges.
Explore a new framework for measuring cybersecurity control value, enabling more effective resource allocation and decision-making in information security management.
Explore tools and techniques of real-world threat actors like OceanLotus/APT32, gaining firsthand insights into cybercriminal operations and enhancing your defense strategies.
Explore cyber resilience strategies, implementation methods, and actionable steps to enhance organizational security through existing programs and meaningful metrics.
Learn to build and effectively use a cybersecurity architecture toolbox, covering analytical, informational, and design tools for successful security planning and implementation.
Explore quantum computing's impact on encryption, including Shor's Algorithm, current quantum tech status, and future implications for cybersecurity. Learn about quantum cryptography and industry developments.
Get personalized course recommendations, track subjects and courses with reminders, and more.