Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore malicious web bots, their impact on applications, and effective countermeasures using OWASP's Automated Threat Handbook. Learn to protect against unwanted automation and improve web security.
Explore purple team strategies to enhance app security programs, bridging defensive and offensive approaches for effective collaboration and improved security outcomes.
Explore physical security implementation for ISO 27002, covering human resources, asset management, and access control. Learn from real-world examples and gain insights on testing, remediation, and continuous improvement.
Explore HTTPS security enhancements, protocols, and tools to strengthen your website's encryption. Learn about free certificates and services for optimal implementation.
Explore how to leverage exposed APIs and plugin interfaces in software tools to enhance functionality, streamline workflows, and create custom solutions for improved efficiency and effectiveness.
Explore the anatomy of malware attacks, from deployment to key players involved. Gain insights into attack strategies, technologies used, and lessons for better cybersecurity preparedness.
Explore account takeover threats, their long-term impact, and effective defense strategies. Learn about hacking techniques, credential stuffing, and tools to protect against evolving cyber risks.
Explore Kubernetes fundamentals, security challenges, and best practices for container orchestration in this crash course, covering clusters, data management, and potential pitfalls.
Explore strategies for integrating security into DevOps pipelines, focusing on attack surface monitoring, automated testing, and merging static and dynamic results.
Explore SEO risks, strategies, and best practices for online businesses, covering topics from negative SEO to content quality and user experience optimization.
Explore serverless computing's impact on security, covering key areas like software supply chain and attack detection. Learn practical approaches and see a demo of building and securing a serverless application.
Explore software security assurance, application security, and organizational strategies for effective resource planning and process building in cybersecurity.
Learn techniques for hiding data from surveillance using distributed steganography, exploring methods like hidden files, alternate data streams, and encryption combined with steganographic approaches.
Explore web application reverse engineering techniques, from information gathering to active testing, to understand behavior, analyze code, and improve security assessments.
Explore web malware anatomy, impact, and detection techniques. Learn about browser vulnerabilities, drive-by downloads, and real-world case studies of exploit kits and botnets.
Get personalized course recommendations, track subjects and courses with reminders, and more.