Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Practical insights on securing Docker containers, from architecture to incident response. Learn threat modeling, attacker techniques, and best practices for DevOps security.
Explore context-based models for accurate data sensitivity classification, focusing on implementation approaches and the "classification before use" paradigm in enterprise data protection.
Explore aviation cybersecurity challenges, global efforts, and cross-sector lessons in this talk on protecting critical systems, ensuring safety, and addressing the expanding digital attack surface.
Explore cybersecurity and privacy challenges in smart city projects, focusing on security by design, public-private collaboration, and innovative solutions for IoT-enabled urban environments.
Explore Bluetooth reverse engineering techniques for IoT devices using common hardware. Learn to analyze and uncover security vulnerabilities in various Bluetooth-enabled products.
Explore OceanLotus, a sophisticated threat group, and their global digital surveillance and cyberespionage tactics. Learn about tracking methods, exploitation techniques, and command and control operations.
Discover effective techniques for subtly influencing user behavior towards secure choices. Learn to identify opportunities and design impactful nudges in cybersecurity contexts.
Explore IoT and satellite security risks in the 5G era, including attack scenarios, network vulnerabilities, and potential solutions for this emerging threat landscape.
Explore Cold War encryption machines, their deliberate weaknesses, and the NSA's exploitation. Uncover the fascinating history of supply-chain attacks and mechanical cryptography.
Explore cybersecurity frameworks, their organization, and effective implementation. Learn to simplify complex security concepts and build stronger programs with insights from a CISO.
Explore the Mirai Botnet's record-breaking DDoS attacks, the international investigation to stop them, and future DDoS threats. Learn IoT product risks and mitigation strategies.
Explore macOS threat detection using Apple's game engine. Learn about monitoring frameworks, rule-based systems, and a comprehensive platform for detecting and responding to cyberthreats on Mac systems.
Explore a real-world data theft case, covering forensics, legal aspects, and emerging cyber threats. Gain insights into adversary tactics and effective response strategies.
Exploring cybersecurity's talent crisis, burnout, and innovative solutions for retention. Leaders discuss culture, inclusion, and diversity to address mid-career attrition and foster a sustainable workforce.
Discover best practices for writing secure code, focusing on business-driven approaches, understanding your model, and integrating security seamlessly into development processes.
Get personalized course recommendations, track subjects and courses with reminders, and more.