Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for effectively communicating the business value of Zero Trust security to non-technical stakeholders, emphasizing its impact, priority, and benefits for organizations.
Explore how the FAA balances regulation with collaboration to maintain aviation cybersecurity, addressing growing digital vulnerabilities in the world's safest aerospace system.
Explore the development of an open-source security-as-code framework, its benefits, and real-world applications in securing complex infrastructures at scale.
Explore a novel cybersecurity approach combining threat modeling, architecture, and product management to implement secure systems efficiently and adapt to evolving threats.
Explore the evolution of public-private cybersecurity partnerships into operational collaboration, featuring insights from key U.S. government agencies on lessons learned, successes, and future scaling plans.
Explore data protection challenges in browsers, regulatory expectations, and strategies to manage risks associated with customer data leaks in web and mobile environments.
Explore RT's global disinformation tactics on Ukraine, including Telegram propaganda and social media networks, revealing Russia's evolving strategies to bypass platform restrictions and sanctions.
Challenging traditional approaches to third-party risk management, this talk inspires new strategies for security leaders to enhance effectiveness and resource allocation in risk assessment processes.
Explore how cybersecurity professionals can collaborate across IT functions to strengthen digital trust, leveraging privacy, quality, risk management, and governance for enhanced enterprise and consumer confidence.
Explore malicious injections in open source software, their impact on the supply chain, and strategies to protect, detect, and respond to these evolving threats.
Explore graph-based AI techniques for mapping enterprise networks, identifying vulnerabilities, and preempting cyber threats using passive data and open-source tools.
Explore flexible password-based encryption and targeted invertible pseudorandom functions in this cryptography session, addressing modern applications and attacks.
Explore cybersecurity risks in ports and shipping, analyzing vulnerabilities and discussing potential solutions for improved detection and response in maritime infrastructure.
Explore failed DevSecOps methods to avoid common pitfalls. Learn why certain practices fail and how to implement effective strategies for secure software development.
Explore AI-driven content synthesizers, their security risks, detection methods, and necessary adjustments to security postures in response to evolving AI content generation technologies.
Get personalized course recommendations, track subjects and courses with reminders, and more.