Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Insights on threat hunting and incident response in Google Workspace, focusing on data exfiltration from Google Drive. Learn forensic investigation techniques for GWS logs from real-world cases.
Explore security risks in GitHub Actions, including build permission issues and "unpinnable actions." Learn about potential consequences and challenges in protecting against compromised third-party actions.
Discover strategies for gaining and showcasing penetration testing experience to launch your career in this field, presented by Phillip Wylie, coauthor of The Pentester Blueprint.
Explore challenges and solutions in modern vulnerability management, focusing on automation, exploitability-based prioritization, and frameworks like CSAF and VEX to improve organizational security posture.
Explore Brazilian cybercrime tactics on Telegram and WhatsApp, including fraud schemes and counterintelligence methods used by criminal groups.
Discover how embracing failures and leveraging weaknesses can lead to unexpected career growth in cybersecurity, from sysadmin to CSO, through personal experiences and insights.
Explore baremetal emulation for PowerPC, its applications in reverse engineering, and the personal journey of creating a new framework while embracing self-discovery and transformation.
Discover how public RDS snapshots can accidentally expose sensitive data and PII. Learn to prevent, detect, and remediate risks associated with this Amazon service feature.
Explore the hidden costs of cyber incidents beyond ransoms and interruptions. Learn how to quantify and model cyber risk for effective security planning and decision-making.
Explore secret sprawl and management maturity, examining high-profile breaches, understanding root causes, and learning effective strategies to protect sensitive credentials.
Discover effective negotiation techniques for cybersecurity professionals to promote better security practices without resorting to fear tactics. Learn to influence decision-makers and drive enterprise-wide improvements.
Explore cognitive security's unique approach to protecting systems, considering interconnectedness and multiple scales. Learn about the Cognitive Security Attack Cycle and strategies for disrupting attacks.
Explore a decade of progress in healthcare cybersecurity, focusing on medical devices and tangible outcomes. Gain insights from experts on trust, teamwork, and strategies for positive change in the field.
Explore advanced leadership skills: understanding employee personalities, practicing empathy, guiding through change, and mastering difficult conversations for improved team management.
Explore vulnerabilities in passwordless authentication, revealing how faulty implementations can lead to greater security breaches than traditional passwords. Learn best practices for developers, pentesters, and users.
Get personalized course recommendations, track subjects and courses with reminders, and more.