Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover the dramatic rise of Latin American banking malware, exploring their anatomy, tactics, and global impact. Learn why these cybercrime threats are so persistent and difficult to eradicate.
Explore evolving cloud-focused malware campaigns, their diverse objectives beyond cryptojacking, and cloud-specific TTPs. Gain insights into recent trends and the use of cloud services in supporting malware attacks.
Explore enterprise security through Star Trek: The Next Generation episodes, analyzing threats, defenders, and potential mitigations in a fun, engaging way.
Explores security risks of low-code/no-code platforms used by business professionals. Presents research findings, demonstrates common security issues, and introduces OWASP framework for mitigating risks in business-led development.
Explore research on psychological factors behind phishing susceptibility and learn strategies to improve security education and measure risk in your organization.
Explore techniques to manipulate machine learning models, focusing on ground truth manipulation and its implications for AI security and reliability.
Explore password security essentials, from creating strong policies to understanding cracking techniques. Learn to secure passwords in AD and AAD, and discover why they remain crucial despite MFA adoption.
Explore vulnerabilities in food supply equipment beyond tractors, uncovering risks to our food ecosystem. Learn about hacker research and how to get involved in securing the agricultural technology landscape.
Learn strategies for managing password breaches, including identifying sources, responding effectively, and maximizing value while avoiding pitfalls in the aftermath of a company account compromise.
Explore limitations of vulnerability detection tools, challenges in vulnerability management, and strategies for improving application security despite imperfect reporting systems.
Learn effective communication strategies for security professionals to persuade non-specialists, drive action, and influence change within organizations. Gain valuable insights to enhance your impact and career growth.
Uncover hidden risks of Azure AD guest accounts, learn exploitation techniques, and discover mitigation strategies to secure your enterprise resources against unauthorized access.
Explores security challenges in water systems and their impact on critical infrastructure sectors, highlighting vulnerabilities and interconnections in the US water supply network.
Explore stealthy data exfiltration techniques in Google Cloud Platform, focusing on Cloud Storage, Cloud SQL, and BigQuery. Learn to detect and prevent unauthorized data access through audit logs and security best practices.
Authentication challenges and solutions in healthcare settings, balancing security with critical access needs during emergencies and clinical procedures.
Get personalized course recommendations, track subjects and courses with reminders, and more.