Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore engineering-focused principles for building scalable threat detection programs, moving beyond traditional SOC models to create more effective and efficient security responses.
Learn strategies for quantifying and communicating security team value through effective metrics, demonstrating risk mitigation and revenue growth contributions.
Discover strategies for fostering a proactive security culture within organizations, exploring successful approaches and learning from past failures.
Explore the creation of BSidesSF's Astronaut Badge, from technical aspects to logistics, and learn about innovative PCB printing with colorful artwork.
Explore a counterintuitive approach to strengthening security by ignoring over 90% of vulnerability alerts, enabling improved workflows and behavior in supply chain security management.
Insights on security management drawn from teenage work experience at Hollywood Video, relating retail theft prevention to modern cybersecurity practices and principles.
Explore the White House's approach to space systems cybersecurity and national strategy, led by the Office of the National Cyber Director, aligning with Biden-Harris Administration's initiatives.
Explore Windows 11's automation feature and its potential security implications. Learn how users can create custom processes that are distributed and executed across machines.
Insider tips from a security recruiter to enhance your InfoSec job search, covering resume optimization, networking strategies, LinkedIn profile improvements, and effective interview techniques.
Insights on scaling security processes at Google, balancing effectiveness with minimal disruption, and maintaining team morale while achieving security goals.
Explore a graph-based approach for efficient vulnerability management in microservices, focusing on identifying and fixing inherited vulnerabilities across large-scale architectures.
Get personalized course recommendations, track subjects and courses with reminders, and more.