Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Insights from board members and cybersecurity experts on strategic involvement in cybersecurity, prioritizing investments, reporting to the board, and navigating cyberattacks.
Explore medical device cybersecurity, FDA guidelines, and the potential for a Cyber Med Safety Analysis Board to assess vulnerabilities and ensure patient safety in healthcare environments.
Explore effective change management frameworks to build a strong security culture, focusing on human factors and organizational priorities beyond technology.
Proactive cloud threat detection techniques, including honeyclouds, integrated monitoring, and AI-driven behavioral analysis for mitigating orchestration attacks and cross-tenant threats.
Explore China's global technology theft strategies and learn effective countermeasures from top US security experts. Gain insights on mitigating vulnerabilities and protecting American innovation.
Explore how CPU telemetry and machine learning can detect concealed malicious code, with insights on feature selection, overhead management, and platform-specific design for effective threat detection.
Explore real-world attacks on serverless infrastructure and learn effective security controls to defend against them in this technical session on cloud workload protection.
Explore the psychology of fear in cybersecurity, learn why scare tactics fail, and discover effective strategies to positively impact awareness, behavior, and culture.
Explore key cybersecurity challenges and recommendations from the Cyberspace Solarium Commission, including government reform, resilience, private sector collaboration, and strengthening norms.
Experts discuss CCPA compliance, recent amendments, and practical steps for businesses to adapt to California's privacy law, including enforcement priorities and future implications.
Explore Lyft's Cartography tool for consolidating technical assets, enabling rapid exploration, repeatable decisions, and automated workflows in cloud security management.
Learn to leverage machine learning and NLP for identifying and tracking security bugs throughout software development, covering concepts, challenges, and practical implementation strategies.
Explore JavaScript skimmers, formjacking, and Magecart attacks. Learn detection techniques, infection methods, and mitigation strategies to protect against data theft and financial penalties.
Explore privacy-preserving machine learning techniques to harness AI's power while maintaining data confidentiality, with insights on federated learning, trusted execution environments, and homomorphic encryption.
Comprehensive guide to enterprise data protection, covering various environments and compliance strategies. Learn holistic approaches to safeguard sensitive information across networks, cloud, and applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.