Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Uncover lateral movement techniques in Azure Kubernetes Service, exploring network policy weaknesses, real-world misconfigurations, and practical hardening steps.
Explore cloud security vulnerabilities in CSP architectures, focusing on Universal DNS Zones and credential abuse scenarios that enable resource hijacking and supply chain attacks.
Uncover source IP spoofing techniques across AWS, Azure, and GCP through hands-on demonstrations, exploring VPC endpoints, cross-tenant identity abuse, and detection methods.
Discover how to eliminate static credentials and implement just-in-time access across your organization, covering technical deployment and crucial organizational buy-in strategies.
Discover GCP service account key risks, real-world breach examples, and secure credential handling practices to protect your cloud infrastructure from malicious attacks.
Uncover SyncJacking and SoftMatching Abuse techniques that exploit Microsoft Entra Connect vulnerabilities to hijack cloud identities in hybrid environments with live demos.
Discover how undocumented AWS changes expose security risks and learn to build proactive threat intelligence using the open-source awssecuritychanges.com project.
Explore Oracle Cloud Infrastructure's unique security approach, contrasting its tenancy model and policy syntax with AWS, Azure, and GCP for multi-cloud strategies.
Uncover critical flaws in AWS security tooling that fail to detect public S3 buckets, revealing undocumented evasion techniques and bypassing detection methods.
Explore security-focused architectures for ML/LLM deployments across multi-cloud environments, covering AWS/Azure controls, data access patterns, and compliance in regulated industries.
Discover strategies for securely integrating acquired companies' cloud environments while mitigating unexpected security risks and handling maturity differences.
Uncover critical security vulnerabilities in AWS Bedrock Agents through prompt injection attacks that enable agent hijacking, unauthorized tool execution, and memory manipulation.
Discover how to exploit AWS Bedrock Guardrails using prompt formatting techniques to bypass sensitive information filters and learn mitigation strategies for AI security.
Discover a critical vulnerability in Google's Gemini Cloud Assist where attackers embed malicious prompts in logs to exploit AI tools and deceive defenders into phishing attacks.
Discover implementation challenges of AWS egress controls at scale, including service limitations, evasion techniques, and unexpected issues when processing terabytes of traffic daily.
Get personalized course recommendations, track subjects and courses with reminders, and more.