Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Experts discuss practical applications of MITRE ATT&CK framework, sharing insights on improving cybersecurity operations, leveraging adversary knowledge, and enhancing organizational defense strategies.
Insights from former NSA and Israeli Intelligence leaders on cybersecurity challenges, leadership strategies, and public-private collaboration in an increasingly connected world.
Explore Google's "BeyondCorp" framework for cloud-era security, enabling seamless remote work without VPNs through a "Zero Trust" approach and user-centric access controls.
Explore Trusted Execution Environments for secure data processing in public clouds, including architectures, runtimes, and tools for creating confidential computing services.
Explore cyber-resilience strategies in an uncertain world, integrating human expertise with machine learning for effective security orchestration and incident response.
Explore Dell's innovative approach to cybersecurity workforce development, focusing on job role assessments and tailored training paths to address skill gaps and create effective career pathways.
Enhance SOC visibility and threat hunting using open-source tools. Learn network blueprinting, automation techniques, and advanced data analysis for effective cybersecurity operations.
Explore user-centric approaches to security design, balancing usability and protection. Learn key strategies for creating intuitive, effective security systems that empower users to control their data.
Explore innovative approaches to cybersecurity beyond threat detection, focusing on reducing attack surfaces and empowering defenders with proactive strategies and application-aware solutions.
Explore advanced MacOS intrusion techniques, TTPs, and countermeasures through real-world case studies. Learn about process visualization, forensics, and effective detection and response strategies.
Explore how technologists are advancing public interests through policy, projects, and organizations. Learn about their impact and future directions in this insightful discussion.
Explore strategies for investigating IoT crimes, including classification, evidence collection, and legal considerations. Learn to leverage IoT data in cybersecurity and protect against evolving vulnerabilities.
Strategies for implementing Microsoft's Red Forest architecture to mitigate Active Directory attacks, covering benefits, challenges, and practical steps for enhanced security in enterprise domains.
Discover how to identify meaningful Key Risk Indicators using FAIR methodology. Learn characteristics of effective metrics and apply sensitivity analysis through case studies to improve risk governance.
Discover cost-effective application security strategies using open-source tools. Learn to implement OWASP projects, assess risks, and create a robust security program tailored to your organization's needs and budget constraints.
Get personalized course recommendations, track subjects and courses with reminders, and more.