Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore adversary emulation using Atomic Red Team to validate EDR tools. Learn about the project's growth, framework, and workflow for creating and contributing tests for ATT&CK techniques.
Discover hidden network access and vulnerabilities using free tools. Learn to identify and mitigate risks from vendor connections and IoT devices in your organization's infrastructure.
Explore enterprise SaaS security strategies, including controls frameworks, integration patterns, and BYOD solutions. Learn to protect data and manage risks in cloud-based business applications.
Explore cyberthreats to national security, democracy, and industry with experts Admiral Stavridis and Professor Kayyem. Gain insights on insider threats, government responsibilities, and potential solutions for cybersecurity challenges.
Explore the Hierarchy of Hacker Needs to understand and manage stress in cybersecurity operations, improving job satisfaction and preventing burnout in the information security field.
Explore aviation cybersecurity challenges, vulnerabilities in aircraft systems, and industry efforts to manage risks through technology and partnerships.
Explore Linux server malware analysis techniques, from basic artifact examination to advanced memory dumping and network capture, enhancing your cybersecurity skills.
Explore securing lesser-known yet critical election technologies. Learn about CIS recommendations, verification processes, and strategies to protect internet-connected election systems from threats.
Explore data-driven measures for assessing vulnerability management programs, comparing practices across organizations and learning how to apply these insights to improve your own strategies.
Explore FIDO2 and WebAuthn for robust user authentication, learn implementation strategies, and understand how these technologies prevent account takeovers and enhance security.
Accelerate your risk assessment approach to meet evolving regulatory demands and stakeholder needs for high-quality decision data in this informative session on effective risk management strategies.
Explore enterprise security with Security Onion, an open-source platform offering comprehensive visibility. Learn about intrusion detection, network monitoring, and incident response techniques to detect and interrupt adversaries quickly.
Explore subdomain takeover vulnerabilities and learn prevention strategies, including education, detection, and hardening techniques, based on Starbucks' experience and solutions.
Explore industry-led framework for secure software development, addressing regulatory challenges, open source, metrics, and emerging technologies like AI in cybersecurity.
Practical guide for rapidly deploying a NIST 800-53 compliant system, covering challenges, solutions, and best practices for meeting FISMA requirements within tight deadlines.
Get personalized course recommendations, track subjects and courses with reminders, and more.