Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Insights on creating a Privacy Operations Center in digital healthcare, addressing global regulations and overcoming challenges in data protection and compliance.
Discover techniques for finding, rotating, and safely managing secrets in applications. Learn best practices for secure secret storage and handling compromised credentials.
Deep dive into building a scalable, lean threat detection pipeline. Learn automation techniques for data ingestion, detections-as-code, and filtering to create a serverless platform for effective threat detection.
Explore cyber threat intelligence as a solution for managing the rapidly expanding threat landscape, prioritizing threats, and providing actionable insights to decision-makers in enterprise security.
Explore modern sandboxes and isolation primitives for enhanced security. Learn when and how to use containment tools, with practical insights for immediate implementation.
Learn to develop proactive Command & Control (C2) threat detections using automated offensive security techniques. Explore push-button infrastructure for simulating complex attacker behaviors and generating high-fidelity signals.
Explore tokenization and obfuscation as data security techniques, addressing challenges in implementing large-scale frameworks alongside conventional encryption methods.
Expert insights on building a security program and fostering cybersecurity culture in early-stage companies, covering roadmap creation and team development from scratch.
Explore privilege escalation techniques in Azure's integrated ecosystem. Learn core concepts and advanced attack vectors for enhanced cloud security awareness.
Insights from a backend engineer turned security professional on navigating corporate security, effective communication, and maximizing your new role beyond day-to-day engineering tasks.
Learn to secure self-hosted GitHub runners, mitigate risks of compromised access tokens, and implement key configuration adjustments to protect CI/CD pipelines from potential network breaches.
Explore recent adversarial techniques to protect facial biometrics, including an open-source mobile app demonstration for real-world privacy preservation against facial recognition.
Strategies for effectively communicating complex technical information to diverse audiences, focusing on user motivation and tailored approaches for successful implementation of transformative solutions.
Insights from Discord's implementation of WebAuthn and Yubikeys for enhanced internal security. Learn about challenges, best practices, and lessons learned in deploying FIDO2/WebAuthn as a superior MFA solution.
Expert panel shares insights on becoming a first-time CISO or Head of Security, covering preparation, pursuit, and success strategies for aspiring security leaders.
Get personalized course recommendations, track subjects and courses with reminders, and more.