Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the intersection of KYC, AML, and cyber threat intelligence. Learn how financial concepts predict and address digital threats, enhancing your ability to anticipate and counter sophisticated cyber attacks.
Explore effective strategies for assessing AI risk in vendor relationships. Learn to leverage tools like NIST AI RMF, ISO standards, and EU-AI Act to enhance your VRM program without compromising business partnerships.
Discover strategies to enter the cybersecurity workforce through competitions and challenges. Learn from industry survey insights and gain practical steps for a successful career transition.
Explore nation-state threats in open-source software, focusing on North Korean Lazarus Group's npm campaigns. Learn evolving tactics and motivations to better defend against sophisticated cyber threats.
Illuminate hidden assets and vulnerabilities in your external attack surface using powerful reconnaissance tools. Proactively defend your digital perimeter and stay ahead of potential threats.
Rethink detection and response metrics with a practical framework, new maturity model, and visual examples. Learn to measure capabilities effectively and tell a compelling story using micro-purple testing techniques.
Explore Active Directory domain persistence techniques, focusing on detection, triage, and recovery strategies. Learn to identify attacks, reclaim control, and enhance Windows Security event auditing.
Discover pathways to an InfoSec career in San Antonio, exploring technical skills, education options, and networking opportunities for success in the evolving cybersecurity landscape.
Integrate a clear path to improved performance by advancing DevSecOps metrics. Learn to deconstruct core metrics for accelerated delivery and increased customer value.
Learn strategies for crafting effective penetration testing reports, including key components, proof-of-concept creation, and common pitfalls to avoid. Enhance your ability to deliver impactful security assessments.
Explore attacker strategies, real-world scenarios, and cost-effective measures to protect small businesses from cyber threats. Learn to engage employees through gamification for enhanced security.
Dissect an Iranian nation-state intrusion, gaining insights into adversarial tactics. Learn threat hunting techniques to uncover and counter sophisticated cyber attacks in your environment.
Explore IoT migration to the cloud, comparing security features of AWS, Azure, and GCP. Learn key considerations for availability, authentication, and logging in IoT ecosystems.
Explore network forensics of vacuum bots, uncovering security and privacy concerns. Learn step-by-step analysis of bot communication, authentication protocols, and potential vulnerabilities in smart home devices.
Deploy and exploit a Log4Shell vulnerability practice range in AWS using Terraform and Ansible. Learn to set up targets and understand the vulnerability's impact.
Get personalized course recommendations, track subjects and courses with reminders, and more.