Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Istio's solutions for micro-services challenges, including traffic management, policy enforcement, and security, to enhance scalability and operational efficiency.
Learn to build secure multi-cloud applications with modern techniques. Explore industry trends, development phases, and essential components like TLS, DNS, user management, and data encryption for robust cloud security.
Explore essential skills, objectives, and methodologies for successful Red Team operations, covering physical access, cloud infrastructure, and effective communication strategies.
Explore the evolution of online identity verification, from historical trends to current challenges and future opportunities, including AI and ML applications in authentication and access management.
Bridging the communication gap between security professionals and developers for successful DevSecOps adoption, with insights on common language and mutual understanding.
Explore a novel approach to automated malware analysis for file uploads in web apps, focusing on scalability, performance, and effective detection of malicious content.
Applying adversarial threat models to supply chain systems, focusing on geo-political risks and industry-specific threats to build effective threat libraries and attack sequences for improved security.
Explore the challenges of security testing automation and its impact on identity, privacy, and overall system protection in modern software development.
Explore innovative approaches to security, balancing speed and confidence. Learn about shared responsibilities, data-driven decision-making, and adapting security practices to real-world challenges.
Explore IoT security challenges and learn how to apply threat modeling to design and test more secure IoT systems, addressing risks in devices, web services, and client applications.
Explore secure configuration management in cloud environments, focusing on protecting sensitive assets, managing configuration secrets, and implementing best practices for DevOps security.
Explore the parallels between the Eisenhower Interstate System and the Internet, uncovering valuable lessons for cybersecurity and predicting the future of our digital infrastructure.
Explore cloud native security patterns for containerized microservices, covering multi-tenancy, authentication, authorization, and encryption. Learn architectural guidance for secure software design in cloud environments.
Learn from a 2-year journey building an AppSec program, covering successes, failures, goal-setting, and execution. Gain insights on static analysis, threat modeling, metrics, and more for effective security implementation.
Explore strategies for integrating application security into modern development processes without hindering progress. Learn about tooling, assessments, and agile methodologies for effective security implementation.
Get personalized course recommendations, track subjects and courses with reminders, and more.