Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how the Exploit Prediction Scoring System (EPSS) consolidates threat intelligence to accelerate vulnerability management maturity and improve decision-making for teams.
Leveraging OSINT in reverse engineering to overcome anti-analysis techniques, track down information from developers, and speed up malware analysis workflows for quicker insights.
Explore how double entry accounting principles can revolutionize cybersecurity programs, offering innovative ways to enhance and streamline security practices.
Explore strategies for assessing novel vulnerabilities in critical infrastructure, focusing on control systems and medical devices. Learn techniques to understand and mitigate risks in complex ecosystems.
Explore GenAI and LLMs' three key concerns and opportunities, with frameworks for implementing necessary guardrails, presented by security expert Sounil Yu.
Explore the Security Technical Program Manager role: responsibilities, success factors, career paths, hiring strategies, and its significance in the security field.
Explore the evolution of malware from its inception to modern-day threats, examining key developments, consistent elements, and lessons for cybersecurity's future.
Explore methods to discover and exploit secrets in git repositories, containers, and compiled apps. Learn about vulnerabilities in API keys and credentials across various environments.
Explore Android Work Profiles' security, threats, and vulnerabilities in enterprise settings. Learn about stakeholder perspectives, potential exploits, and actionable steps for enhancing mobile security configurations.
Learn to build a cost-effective micro-SIEM for AWS using EventBridge, CloudTrail, SNS, and ChatBot. Discover how to tailor security monitoring to your specific needs and budget constraints.
Empowering hackers with strategies for positive global impact, including empathy, storytelling, and cyber-civics, to create meaningful change in the world.
Fireside chat exploring international cyber resilience and hacker involvement in solutions, featuring CISA Director Jen Easterly and cybersecurity expert Keren Elazari.
Explore secure delegation of AWS permissions using SCPs, IAM boundaries, and policies. Learn to empower engineering teams while maintaining security through automated compliance and remediation.
Explore potential attack vectors in GitHub Actions, including novel techniques like Malicious Custom Action and GitHub Actions C2. Learn about CI/CD security threats and their implications.
Strategies for building your security team's public presence through community engagement, content creation, and fostering a culture of knowledge sharing and professional development.
Get personalized course recommendations, track subjects and courses with reminders, and more.