Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover key AI adoption trends, emerging risks, and actionable steps to secure and govern AI systems, enabling confident innovation while addressing security challenges.
Discover how Secure Elements (SEs) enable high security for digital ID wallets, protecting users' identities as organizations advance their implementations.
Explore the latest activities of notorious cyberthreat groups, from Chinese telco hacking to Russian operations, and learn how these adversaries innovate and what defenders should watch for.
Explore how a regulation-mandated accessibility plugin became a widespread XSS vulnerability vector, affecting thousands of organizations across sensitive sectors.
Discover how financial institutions balance identity security with user experience, turning seamless protection into a competitive advantage while preventing fraud in digital business.
Explore secure architectures for deploying LLMs in federal environments, including RAG advantages, multi-agent workflows, and data safety considerations for FISMA compliance.
Discover practical frameworks for building a business-centric application security program, securing buy-in, fostering a security-first culture, and transforming AppSec into a strategic enabler.
Explore how AI is transforming America's identity systems, from paper-based to digital frameworks, addressing deepfakes and the fundamental question of "what is real?" in our evolving digital landscape.
Explore systemic defense strategies against phishing attacks, including AI-enhanced threats, and discover upstream protection methods that can create ecosystem-wide impact.
Explore critical infrastructure protection strategies with industry and government experts, focusing on proactive and reactive measures against sophisticated nation-state threats.
Discover how to leverage AI for detecting silently patched security vulnerabilities in software supply chains by analyzing public changelog data.
Discover the importance of key blocks in data protection, exploring key protection methods, standards, and future developments in this informative security primer.
Explore how new cyber incident reporting requirements impact investigations, materiality determinations, attorney-client privilege, and law enforcement coordination with experts from Wiley Rein, Mandiant, and FBI.
Explore how conversational AI will replace GUIs by 2030, creating security challenges as agent-based systems gain agency—a vulnerability threat actors traditionally exploit in humans.
Explore eight command and control (C2) tools through comprehensive analysis of their communication methods and detection strategies in this 43-minute conference talk. Examine Metasploit, Mythic, Merlin, CobaltStrike, Sliver, BruteRatel, DropboxC2C, and S…
Get personalized course recommendations, track subjects and courses with reminders, and more.