Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore OpenSSL's FIPS 140-2 validation, architectural changes, and industry impact. Learn about TLS v1.3 support, validation scope, and post-certification steps in this technical presentation.
Quantitative analysis of software security practices' impact on risk outcomes, based on data from 200 Comcast teams. Insights on effective strategies for enhancing cybersecurity in diverse tech environments.
Explore trends in business email compromise, criminal tactics, and industry strategies to combat this $26B problem in financial services. Learn intelligence gathering, disruption techniques, and fraud prevention.
Explore the power, promise, and privacy challenges of biometric data in our digital society. Learn about risks, legal restrictions, and practical approaches to implementing this technology.
Explore how user experience design can simplify privacy compliance, making it more accessible and scalable for both organizations and consumers. Learn UX principles to humanize privacy integration.
Explore a decade-long FBI and Symantec investigation into a cybercrime gang with strong operational security, revealing investigative techniques and lessons learned from cracking their defenses.
Explore strategies for decrypting encrypted network traffic, focusing on TLS 1.3 challenges and solutions like SSL fingerprinting and session-key forwarding for effective network security operations.
Explore serverless attack vectors, security challenges, and defense strategies in cloud computing. Learn about potential vulnerabilities and best practices for protecting serverless architectures.
Explore AI security threats, including adversarial attacks and data poisoning. Learn detection, protection, and mitigation strategies for AI/ML systems from Microsoft experts.
Comprehensive methodology for IoT security testing, covering functional evaluation, reconnaissance, testing phases for various components, and analysis. Equips testers with skills for enterprise and consumer IoT ecosystems.
Discover innovative approaches to application security, including a "credit score" system, an exclusive security champions program, and improved scanning techniques for large-scale IT environments.
Explore advanced red team operations management with Abaddon, a software designed to enhance efficiency, stealth, and reporting capabilities in complex security assessments.
Explore TD Ameritrade's multi-cloud security logging approach, focusing on critical events, use cases, and implementation strategies for AWS and Azure to enhance incident response and threat management.
Explore real-world implementations of the NIST Privacy Framework through case studies from Okta and Equifax. Learn about challenges, successes, and adoption strategies for enterprise risk management.
Discover advanced methods for identity compromise detection using cloud logs, SIEMs, and telemetry. Learn from Microsoft's experience in protecting millions of authentications.
Get personalized course recommendations, track subjects and courses with reminders, and more.