Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how AWS leverages global threat intelligence to deliver automated security responses and real-time protection, processing vast security data to safeguard cloud assets.
Discover how AWS removes AI security complexity, enabling rapid development-to-production deployment with proven foundations, flexible controls, and automated reasoning for confident innovation.
Uncover cloud security insights through comprehensive data analysis of infrastructure misconfigurations, GenAI risks, and data exposure patterns in modern DevOps workflows.
Discover how to build comprehensive GenAI governance frameworks using AWS controls like VPC, IAM, and KMS, plus automated validation through Config rules and CloudTrail monitoring.
Discover how Comcast balances developer agility with security using AWS resource control policies, permissions boundaries, and IAM Access Analyzer for centralized guardrails.
Discover AWS Network Firewall's latest features to simplify outbound security controls, combat ransomware, and strengthen your network defense policies effectively.
Discover real-world cloud threat patterns and build robust detection capabilities with Unit 42's frontline incident response expertise and AWS partnership insights.
Discover how Wolters Kluwer and GoTo Technologies use AWS IAM Access Analyzer to achieve least-privilege permissions, streamline policy refinement, and monitor unused access across organizations.
Discover how Autodesk manages cloud security risks at scale using AWS and Orca Security for vulnerability management, compliance audits, and attack prevention.
Discover how to build AI security agents using Amazon Bedrock and Security Lake through live coding demos. Learn automated workflows, log analysis, and response procedures with generative AI.
Discover how to transform application access control from RBAC to policy-based control using Amazon Verified Permissions and Cedar, enabling granular, scalable authorization.
Discover best practices for securing generative AI applications using AWS services like Bedrock and SageMaker with CrowdStrike Falcon Cloud Security protection.
Discover how Trainline built custom FinOps tools across four pillars: cost visibility, forecasting, optimization, and operations to embed cost awareness into their culture.
Explore how emerging technologies like quantum computing, AI robotics, and space tech create new attack surfaces while discovering that time-tested security methods remain most effective.
Discover how Amazon Q Developer enables proactive vulnerability detection and shift-left security practices, featuring FINRA's real-world implementation of AI-powered development workflows.
Get personalized course recommendations, track subjects and courses with reminders, and more.