Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to investigate and respond to GenAI chatbot security incidents with practical methods for isolating attacks, gathering information, and implementing LLM guardrails before your company faces a crisis.
Discover how Hawk, a free open-source tool, automates log collection from Microsoft Cloud environments, helping security teams reduce investigation time, flag high-risk behaviors, and effectively hunt for threats without costly commercial solutions.
Discover how to transform your resume into a cybersecurity career toolkit in this gaming-inspired session. Learn to reskill yourself for infosec roles through practical strategies and interactive guidance.
Explore how AI agents can automate SOC operations to combat sophisticated cyber threats, reduce analyst burnout, and enhance defense against AI-enabled attacks through orchestrated workflows.
Discover how a non-partisan cybersecurity initiative identified thousands of vulnerabilities in political campaigns and party offices before the 2024 U.S. Election, building on previous research of state-level political party domain vulnerabilities.
Discover how decentralized mixnets can provide stronger privacy protection than Tor and VPNs, their comparative advantages, and practical implementation for enhanced online anonymity.
Discover how to implement stealthy tripwires using deception techniques like canaries and honey resources to detect post-breach lateral movement and privilege escalation in cloud environments.
Explore a grounded approach to AI and LLM security, focusing on fundamental best practices while addressing new challenges in prompt engineering and development.
Gain insights into effective communication strategies for security and privacy teams, learning to influence business leaders and navigate organizational politics for better risk management.
Explore strategies for creating inclusive, alcohol-free networking events in cybersecurity while fostering a healthier professional culture and supporting individuals in their sobriety journey.
Discover how to effectively leverage the MITRE ATT&CK framework as a defender, translating adversary tactics into actionable defensive strategies, analytics development, and SOC maturity improvements.
Discover how to apply CI/CD pipeline principles to talent development and workforce integration, focusing on strategies for continuous improvement at organizational and national levels.
Discover practical approaches to agile threat modeling for large-scale systems, focusing on cloud architectures, SDLC integration, and cost-effective security strategies.
Dive into the complexities of vulnerability disclosure and CVE processes, exploring recent events that highlight systemic issues and their impact on security professionals' ability to manage threats effectively.
Explore real-world cybersecurity breaches through engaging hacking stories, drawing parallels with Jurassic Park to understand how attackers penetrate seemingly secure digital systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.