Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from RSA Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore ICS/OT cybersecurity challenges and solutions in the wake of forced digital transformation, covering threat landscapes, risk mitigation strategies, and long-term planning approaches.
Learn to conduct cybersecurity due diligence for M&A activities, including program components, metrics for informed decisions, and strategies for both buy and sell sides to protect and evaluate effectively.
Learn strategies to integrate privacy policies and infrastructure into products, enhancing user trust and regulatory compliance while fostering growth and empowering users to understand data usage.
Demystifies threat hunting as a cyber-defense strategy, exploring its implementation, phases, and best practices to effectively combat unknown threats in cybersecurity.
Explore cyber-supply chain security risks, best practices, and policy recommendations. Learn about Software Bill of Materials and its role in managing software dependencies and vulnerabilities.
Explore an open-source framework for drone security testing, covering attack types and vulnerability analysis. Learn to assess and enhance drone safety in various applications.
Insights from two weeks of dialogue with Russian ransomware operators, revealing their methods, motivations, and advice for IT security, with implications for future cybersecurity strategies.
Explore the evolving landscape of social engineering in cybersecurity, focusing on new attack vectors, their sophistication, and strategies for fraud prevention teams to counter these emerging threats.
Explore effective security communication strategies, learn to develop targeted plans, and gain insights on avoiding common pitfalls in large-scale security initiatives.
Improve security communication effectiveness by analyzing document elements like headings and calls to action, with examples of impactful messaging to drive desired behavioral changes.
Learn best practices for designing robust access control systems in web applications, covering anti-patterns, principles, and practical examples for secure implementation.
Maximize penetration test value: Learn strategies for internal buy-in, aligning with business goals, choosing testers, and evaluating results. Gain practical insights from industry expert Ed Skoudis.
Explore new research on coordinated vulnerability disclosure, examining perspectives of researchers and organizations to understand behaviors, preferences, and practices in software flaw reporting.
Explore data ethics and privacy engineering in cybersecurity, focusing on ethical considerations, stakeholder expectations, and practical applications to create better security products.
Explore Mercedes-Benz's approach to cybersecurity for connected cars, including fleet defense strategies and research by 360 Group on vehicle vulnerabilities and attack surfaces.
Get personalized course recommendations, track subjects and courses with reminders, and more.