Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover practical frameworks for building a business-centric application security program, securing buy-in, fostering a security-first culture, and transforming AppSec into a strategic enabler.
Explore how AI is transforming America's identity systems, from paper-based to digital frameworks, addressing deepfakes and the fundamental question of "what is real?" in our evolving digital landscape.
Explore systemic defense strategies against phishing attacks, including AI-enhanced threats, and discover upstream protection methods that can create ecosystem-wide impact.
Explore critical infrastructure protection strategies with industry and government experts, focusing on proactive and reactive measures against sophisticated nation-state threats.
Discover how to leverage AI for detecting silently patched security vulnerabilities in software supply chains by analyzing public changelog data.
Discover the importance of key blocks in data protection, exploring key protection methods, standards, and future developments in this informative security primer.
Explore how new cyber incident reporting requirements impact investigations, materiality determinations, attorney-client privilege, and law enforcement coordination with experts from Wiley Rein, Mandiant, and FBI.
Explore how conversational AI will replace GUIs by 2030, creating security challenges as agent-based systems gain agency—a vulnerability threat actors traditionally exploit in humans.
Explore eight command and control (C2) tools through comprehensive analysis of their communication methods and detection strategies in this 43-minute conference talk. Examine Metasploit, Mythic, Merlin, CobaltStrike, Sliver, BruteRatel, DropboxC2C, and S…
Discover how AI transforms cybersecurity threats and defenses, emphasizing the need for skilled professionals, continuous learning, and strategic collaboration to combat evolving attacks.
Discover Mantis, a defensive system that exploits LLM vulnerabilities to counter AI-driven cyberattacks by making attackers' models sabotage themselves through strategic prompt injection.
Discover the top 3 cloud security priorities from a CIO's perspective: misconfigurations, vulnerabilities, and identity governance to fortify your defenses.
Uncover advanced adversary tactics and essential countermeasures to detect, disrupt, and prevent sophisticated cyberattacks from escalating into major breaches.
Discover how to maximize cybersecurity effectiveness on limited budgets by prioritizing critical assets, leveraging existing tools, and implementing cost-effective automation strategies.
Uncover why current AI red teaming approaches fail and learn essential strategies for building reliable, commercially viable LLMs from DEF CON's Generative Red Team insights.
Get personalized course recommendations, track subjects and courses with reminders, and more.