Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the evolving cybercriminal landscape since Russia's invasion of Ukraine, analyzing threat actor activities and dark web engagements to provide measurable insights on current and future trends.
Explore data governance strategies to mitigate cyber risks and minimize data exfiltration impact. Gain practical insights for aligning information management with organizational protection.
Explore architectural practices for integrating security and compliance into regulated workloads on hybrid cloud, focusing on zero trust principles and transparent assurance.
Explore advanced privacy-enhancing technologies, including PAPR for anonymous credentials and unlinkable policy-based sanitizable signatures, presented by PhD researchers from leading universities.
Explore foundational principles and emerging practices for developing an effective cyber risk appetite, including guidance on compliance thresholds, KPIs, KRIs, and KCIs for enhanced information security.
Comprehensive analysis of ransomware payment ecosystem, exploring collective actions to disrupt operations. Examines information sharing, friction points, and community roles in making ransomware less profitable.
Explore legal implications of deceptive cybersecurity techniques through a mock hearing, examining the concept of digital artifacts as attractive nuisances and their potential consequences.
Explore real-world challenges and lessons in applying Zero Trust to consumer identities, balancing user experience with fraud prevention and detection of malicious actors.
Comprehensive analysis of macOS malware oRAT using unconventional methods, revealing its full functionality through custom command and control server interactions.
Explore the rise and fall of REvil, a notorious ransomware group, through years of research. Learn about cybercriminal empire building, takedown processes, and the impact of public/private partnerships in combating ransomware.
Learn best practices for implementing employee privacy rules, understand new regulations, and gain insights into employee privacy expectations to achieve compliance and foster trust.
Explore blockchain's security and trustworthiness in Crypto FinTech systems, analyzing technology and social context to inform business and cybersecurity decisions.
Experts analyze the unexpected absence of cyber Armageddon following Ukraine's invasion, discussing observations, reasons, and future implications for global cybersecurity landscape.
Explore how Web3's shift to decentralized systems impacts identity and access management, paving the way for enhanced online security and user experience.
Learn Infrastructure Susceptibility Analysis (ISA) to prioritize cyber vulnerabilities and focus mitigation efforts on critical weaknesses most likely to be exploited, enhancing organizational security.
Get personalized course recommendations, track subjects and courses with reminders, and more.