Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Automated firmware analysis for IoT and OT devices using EMBA, an open-source tool that detects vulnerabilities, identifies exploits, and supports penetration testing of embedded systems.
Explore strategies for protecting user data and identity in software development, emphasizing the ethical responsibility of engineers as stewards of sensitive information.
Explore data-driven security roles, their overlapping skills, and career paths in this talk on the evolving landscape of security data science teams and job titles.
Explore creating custom AI platforms using TensorFlow, covering data collection, cleaning, training, and building a CLI-based system tailored to your organization's environment.
Explore disruptive changes in energy delivery, addressing equity, security, resilience, affordability, and sustainability amid historical injustices, climate threats, and global turmoil.
Explore challenges and solutions for securing IoT and OT networks, including asset inventory, vulnerability assessment, and implementing controls while ensuring system safety and availability.
Uncover limitations of vulnerability scanners and SCA tools through groundbreaking research. Learn about hidden vulnerabilities, scanner blindspots, and the need for holistic software security approaches.
Explore cross-functional collaboration between Cyber Threat Intelligence and Offensive Security for advanced threat detection. Learn about realistic operations, live demos, and open-source tools to improve security investment.
Explore the implications of the Yandex leak, revealing insights into big tech's data usage practices and the extent of user information collection and analysis.
Applying CARVER vulnerability assessment to Conti ransomware leaks for rapid enterprise risk evaluation. Methodology and steps for maximizing intelligence value from this rare event.
Practical insights and playbooks for secure M&A processes, focusing on pre-acquisition evaluation and post-close integration to minimize risks without impeding business growth.
Reflection on a decade of "I Am The Cavalry" initiative, discussing its impact on cybersecurity, public safety, and future challenges in an increasingly connected world.
Explore adversary emulation techniques using real-world APT scenarios to improve cybersecurity defenses and industry standards through MITRE ATT&CK Evaluations.
Explore real-world strategies for cultivating a risk-aware cybersecurity culture through case studies, engaging both technical and non-technical staff to enhance organizational security.
Recruiters share insights on navigating job searches in cybersecurity. Learn how to communicate effectively, handle interviews, and follow up during the hiring process. Ask questions and gain valuable career advice.
Get personalized course recommendations, track subjects and courses with reminders, and more.