Courses from 1000+ universities
Seven years after replacing a Yale president with a fintech CEO, Coursera picks an Amazon veteran to help fix its slowing growth and falling stock price.
600 Free Google Certifications
Computer Science
Data Analysis
Ethical Hacking
FinTech Foundations and Overview
Managing Conflicts on Projects with Cultural and Emotional Intelligence
Extreme Geological Events
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Etablering av nasjonal tillitstjeneste i norsk helsesektor: HelseID. Utfordringer ved implementering av OAuth2 og OpenID Connect i konservativ bransje med legacy-systemer. Eksempler på løsninger for både eldre og moderne applikasjoner.
Simplifying microservices security through automation and design principles. Learn to build a secure cluster, monitor networking, manage containers, and implement least privilege access for robust, scalable security.
Explore side channel analysis attacks on AES encryption, including power consumption analysis and key extraction techniques, with a live demonstration on an embedded CPU.
Explore binary exploitation through live demonstrations, including a Sudo vulnerability exploit. Learn detection and prevention techniques for memory corruption vulnerabilities in software.
Explore methodologies for uncovering hidden vulnerabilities that automated tools miss, enhancing application security beyond reliance on automation.
Explore key DevSecOps metrics, from theory to practice. Learn to identify, track, and visualize essential security KPIs for your team's success and continuous improvement in the DevOps world.
Explore Linux application sandboxing techniques, including namespaces, file systems, and Seccomp, to isolate and secure your applications while gaining insights into Docker's implementation.
Explore common Python coding mistakes leading to vulnerabilities, their consequences, and prevention strategies. Learn to bridge the communication gap between development and security teams.
Insights on common security shortcomings in small software companies and cost-effective strategies to address them, based on analysis of hundreds of businesses.
Learn from Evernote's 2012 data breach experience: prevention strategies, immediate response actions, and long-term recovery steps for safeguarding your company's valuable data against cyber threats.
Explores SAML2's flaws and argues for OpenID Connect as a superior single sign-on protocol, examining top challenges and demonstrating vulnerabilities in implementations.
Explore Java's latest security enhancements, including SHA-3 support, deserialization security, improved TLS, and key management. Learn about API changes and new defenses in Java 9-17 platforms.
Learn to secure your software using GitHub's features, including signed commits, dependency scanning, secret scanning, and CodeQL, to protect against various attack vectors in modern development.
Explore high-speed data processing techniques, including Bloom Filters, to handle massive volumes of telemetry data efficiently. Learn infrastructure strategies for processing 65,000 JSON payloads per second.
Explore common AppSec challenges, framework limitations, and practical solutions for building more secure applications at scale. Learn robust patterns to enhance your security practices.
Get personalized course recommendations, track subjects and courses with reminders, and more.