Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Psychology
Data Analysis
Digital Marketing
Introduction to Psychology
Nutrition, Exercise and Sports
Computing in Python I: Fundamentals and Procedural Programming
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore container security challenges and learn to implement an automated solution that integrates with CI/CD pipelines, addressing application, code, web server, and host security.
Explore IoT and OT hacking using software-defined radio, covering wireless vulnerabilities, attack surfaces, and exploitation techniques for non-WiFi RF protocols in various devices.
Explore dangers of rogue radio frequencies and learn techniques to identify, locate, and protect against potential threats in organizational and personal contexts.
Explore ICS/SCADA attack detection techniques, relevant logs, and ML-based anomaly detection methods. Includes practical demonstrations and insights for enhancing industrial cybersecurity.
Journey to cybersecurity's future: evolving threats, policy shifts, and the role of friendly hackers. Explore trust as a feature and how hacking can benefit you in our digital universe.
Live demonstrations of cutting-edge hacking techniques bypassing NextGen solutions, with insights on defensive strategies and audience participation in attack technique discussions.
Explore the manipulation of public opinion through social media, its impact on democracy, and potential solutions with experts from tech giants and national security.
Explore DevSecOps principles and self-healing cloud architectures. Learn to identify and auto-remediate security misconfigurations in real-time, enabling scalable and secure multi-cloud environments.
Explore quantitative cyber-risk analysis through real-world scenarios, debunking myths and gaining practical tools for data-driven risk management in confidentiality breaches.
Explore model-driven security, dynamic provisioning, and advanced threat response strategies to protect against modern cyberattacks and enhance organizational security posture.
Explore legal risks and mitigation strategies for AI and machine learning applications, covering liability issues, algorithmic biases, and emerging challenges in autonomous systems and healthcare.
Learn key concepts for secure cloud architecture design, including building security at every layer, designing for failure and elasticity, and managing the cloud "blast radius" in AWS and Azure.
Explore how APT groups exploit cloud services for cyberespionage, examining real-world cases, attack strategies, and implications for defenders and researchers across Windows and Android platforms.
Learn modern detection engineering using CI/CD pipelines to automate rule testing. Explore Attack Range for simulating adversary attacks and streamline your security workflow.
Explore balancing security and flexibility in remote work during COVID-19, addressing challenges, mitigating risks, and implementing effective cybersecurity strategies for organizations.
Get personalized course recommendations, track subjects and courses with reminders, and more.