Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore browser isolation mechanisms, their effectiveness, and future directions for enhancing web application security against untrusted code and third-party attacks.
Explore detection-as-code principles for efficient security operations, leveraging version control, test-driven development, code reuse, and automated workflows in detection and response teams.
Comprehensive guide for effective security program implementation, focusing on vendor selection, value optimization, and marketplace insights from both client and vendor perspectives.
Explore techniques for attacking and defending Terraform infrastructure, including secret exfiltration and deploying malicious applications, with insights on mitigating vulnerabilities in cloud environments.
Explore graph-based ontologies and semantic reasoning to revolutionize security data analysis, consolidate information, and automate logical conclusions for more efficient cybersecurity workflows.
Explore the complexities of security patching through a game show format. Experts discuss challenges, policies, and solutions for effective patch management in modern enterprises.
Exploring the rise of coinminers: their impact, technical aspects, detection methods, and defensive strategies. Insights into tracking campaigns, profits, and future predictions for this emerging cybersecurity threat.
Explore the future of strong authentication with FIDO U2F and FIDO 2 standards, offering simplicity and security for online users while addressing the limitations of traditional hardware tokens.
Explore advanced mobile security techniques and real-world vulnerabilities in Instagram, with insights on bug bounty hunting, responsible disclosure, and prevention strategies in the software development lifecycle.
Exploiting Windows service accounts: mismanagement risks, detection techniques, and prevention strategies. Includes live demonstrations and introduces an open-source tool for vulnerability assessment in networks.
Explore the rise of targeted cyber attacks, their effectiveness, and economic advantages. Learn about real-world examples and strategies to counter this growing threat.
Get personalized course recommendations, track subjects and courses with reminders, and more.