Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore effective DevSecOps practices, emphasizing collaboration between security and DevOps teams. Learn prerequisites, case studies, and strategies for leveraging existing resources to enhance security integration.
Strategies for developing role-based security education, focusing on high-risk teams, collaborative threat modeling, and contextualizing security hygiene to improve effectiveness and scalability.
Explore stealthy data exfiltration techniques using everyday system objects and processes. Learn to identify and defend against sophisticated attacks that leverage normal-looking channels for malicious purposes.
Explore strategies for fostering community in cybersecurity, focusing on gender diversity, professional development, and leadership. Learn to create inclusive environments and drive positive change in the industry.
Explore the future of IoT, from embedded sensors to quantum computing, and its impact on AI, autonomous vehicles, and augmented reality. Discover key industry trends and regulatory considerations.
Strategies for protecting corporate data from internal threats, focusing on database security, GDPR compliance, and collaboration between engineering and operations teams.
Explore strategies for ensuring security in third-party software procurement, including case studies of vulnerabilities and guidance for integrating security considerations into the purchasing process.
Strategies for scaling AppSec programs using automation, continuous health checks, and event-based security to keep pace with rapid software development and delivery in large organizations.
Practical insights on conducting Information Security Risk Assessments for software products, covering methods, tips, and lessons learned to identify and mitigate potential security risks.
Explore securing a Raspberry Pi home monitoring system, covering project considerations, GPIO layout, software installation, connectivity, settings, firewall, and service status.
Explore IoT security vulnerabilities in mobile apps, focusing on common mistakes, attack vectors, and research techniques. Learn to identify and exploit weaknesses in device-to-cloud communication.
Explore ransomware attacks, IoT-based DDoS threats, and their potential combination. Learn analysis techniques, attack stages, and future cybersecurity challenges in this comprehensive overview.
Secure DevOps: Beyond tools, focus on risk assessment, threat modeling, and custom security controls. Learn to integrate security effectively in CI/CD pipelines for robust application protection.
Explore cloud operations at scale, multi-account models, and automated guardrails for security and compliance. Learn to leverage automation tools for efficient cloud management and collaboration.
Exploring cybersecurity challenges for non-profits, this talk offers strategies to protect organizations, donors, and beneficiaries in the digital age, emphasizing unique sector needs and practical solutions.
Get personalized course recommendations, track subjects and courses with reminders, and more.