Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore how Web3's shift to decentralized systems impacts identity and access management, paving the way for enhanced online security and user experience.
Learn Infrastructure Susceptibility Analysis (ISA) to prioritize cyber vulnerabilities and focus mitigation efforts on critical weaknesses most likely to be exploited, enhancing organizational security.
Explore Workload Identity Federation to replace long-lived cloud credentials with short-lived tokens, enhancing security against cloud breaches and improving authentication workflows for external identity providers.
Learn to transform complex security issues into compelling narratives for effective board communication. Discover techniques to convert technical attack paths into actionable stories that drive decision-making.
Learn techniques for effective internal audits in cybersecurity, including risk management, control assessment, and reporting cyber maturity. Explore industry standards like CIS Controls and FAIR to enhance your audit practices.
Explore Active Directory vulnerabilities and defense strategies for both on-premises and Azure environments. Learn to identify and mitigate common attack vectors to enhance organizational security.
Explore GitHub Actions security vulnerabilities and their impact on CI/CD pipelines. Learn about common exploits and best practices to protect your supply chain from potential attacks.
Discover how machine learning and graph modeling can uncover hidden adversaries in cybersecurity. Learn to apply the CHRYSALIS framework for effective threat detection using real-world data.
Explore the journey of automating Data Subject Access Request fulfillment, covering strategies for standardization, validation, and regulatory compliance while enhancing user experience.
Unveiling a pioneering cybersecurity technology tree for data security, exploring gaps in current frameworks, and demonstrating the methodology for building comprehensive cyber capabilities.
Expert panel explores challenges and solutions for securing the software supply chain, offering insights from developer, CISO, and policymaker perspectives to address critical security issues.
Explore ransomware response strategies through a poker analogy, challenging the "never pay" stance and framing decisions as Call, Raise, or Fold for informed business choices.
Explore critical emerging legal issues in cybersecurity with ABA leaders, covering systems of trust, privacy, AI's role, and C-Suite vulnerabilities in this informative panel discussion.
Explore misinformation as a cyberthreat and learn about the role of security professionals in protecting truth, with insights from industry experts and policy advocates.
Explore innovative approaches to data privacy and security with Zero Trust principles, reshaping organizational strategies for enhanced protection and compliance.
Get personalized course recommendations, track subjects and courses with reminders, and more.