Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover Azure Arc security vulnerabilities that enable lateral movement from on-premise to cloud, including misconfigurations and privilege escalation techniques.
Explore offensive and defensive tactics for Snowflake data platforms, including TTPs, security controls, detection strategies, and a new open-source simulation tool.
Explore how malicious maintainers can stealthily inject code into GitHub releases through CI/CD pipeline manipulation without touching application code directly.
Explore a comprehensive analysis of secret leaks in misconfigured cloud storage buckets, covering 215 exposed credentials and responsible disclosure outcomes across major platforms.
Discover AWS Backup complexities for ransomware protection, including vault locks, KMS keys, LAG vaults, and deployment challenges with open-source Terraform solutions.
Explore how behavioral economics reveals why cloud security metrics mislead teams, and learn frameworks to move beyond intuitive thinking toward analytical approaches that reduce real risk.
Dive into rapid response research methods for cloud security incidents, exploring real-world supply chain attack investigation techniques and community collaboration strategies.
Discover how to build interlocking compliance hierarchies for cloud environments, covering NIS2, DORA, GDPR frameworks and practical implementation strategies for European organizations.
Discover insights from a decade-long journey scaling AWS infrastructure from one account to hundreds, exploring security, management challenges, and business value delivery.
Uncover critical Azure RBAC vulnerabilities and API flaws that enable attackers to breach cloud infrastructure and access on-premise networks via corporate VPN connections.
Master AWS honey tokens to detect attackers using deliberately exposed credentials, covering advanced detection strategies and API internals to outsmart sophisticated threats.
Uncover the reality of cloud threats through rigorous analysis of H1 2025 data, separating fact from fiction while learning actionable improvements for threat intelligence.
Uncover how cybercriminals systematically exploit cloud free tiers for profit, from automated account generation to underground marketplace resale, with real-world TTPs and defense strategies.
Discover how AI agents autonomously simulate cloud attacks to build empirical knowledge layers, mapping telemetry to MITRE tactics for enhanced detection engineering across AWS, Azure, and GCP.
Uncover the complexities of cloud storage logging across AWS, Azure, and GCP, learning to build scalable threat detection systems that cut through noise and surface critical security signals.
Get personalized course recommendations, track subjects and courses with reminders, and more.