Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how Comcast balances developer agility with security using AWS resource control policies, permissions boundaries, and IAM Access Analyzer for centralized guardrails.
Discover AWS Network Firewall's latest features to simplify outbound security controls, combat ransomware, and strengthen your network defense policies effectively.
Discover real-world cloud threat patterns and build robust detection capabilities with Unit 42's frontline incident response expertise and AWS partnership insights.
Discover how Wolters Kluwer and GoTo Technologies use AWS IAM Access Analyzer to achieve least-privilege permissions, streamline policy refinement, and monitor unused access across organizations.
Discover how Autodesk manages cloud security risks at scale using AWS and Orca Security for vulnerability management, compliance audits, and attack prevention.
Discover how to build AI security agents using Amazon Bedrock and Security Lake through live coding demos. Learn automated workflows, log analysis, and response procedures with generative AI.
Discover how to transform application access control from RBAC to policy-based control using Amazon Verified Permissions and Cedar, enabling granular, scalable authorization.
Discover best practices for securing generative AI applications using AWS services like Bedrock and SageMaker with CrowdStrike Falcon Cloud Security protection.
Discover how Trainline built custom FinOps tools across four pillars: cost visibility, forecasting, optimization, and operations to embed cost awareness into their culture.
Explore how emerging technologies like quantum computing, AI robotics, and space tech create new attack surfaces while discovering that time-tested security methods remain most effective.
Discover how Amazon Q Developer enables proactive vulnerability detection and shift-left security practices, featuring FINRA's real-world implementation of AI-powered development workflows.
Discover how to implement end-to-end encryption for Kubernetes applications using AWS Private Certificate Authority and automated certificate lifecycle management patterns.
Explore threat modeling techniques for building secure batch job systems on AWS, covering design principles, security threats, mitigations, and production deployment strategies.
Discover how to implement advanced security monitoring using AWS CloudTrail Lake and VPC endpoint events for comprehensive compliance auditing and enhanced cloud security posture.
Discover how Mendix uses generative AI chatbots to streamline SSO onboarding, reducing IT burden and accelerating user productivity through 24/7 personalized assistance.
Get personalized course recommendations, track subjects and courses with reminders, and more.