Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Ethical Hacking
Lean Production
Introduction to Cyber Security
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore multi-factor authentication solutions, evaluation criteria, and implementation considerations for stronger security. Gain insights into market offerings and their credibility.
Pragmatic approaches and tools for ruggedizing your development lifecycle, from code commit to running system. Learn solutions for secure, resilient applications in fast-paced environments.
Discover techniques to detect ongoing network breaches, analyze anomalous behavior, and eradicate threats from Red Team experts turned Blue Team specialists.
Practical strategies for rapid and secure software development, addressing challenges in modern engineering organizations and emphasizing rugged software practices.
Explore quality assurance in penetration testing, addressing declining standards and providing guidance for improving security assessment practices and maintaining excellence in the field.
Explore tools and tips for effective penetration testing, from data collection to reporting, with insights on organization, documentation, and disaster recovery.
Exploring cybersecurity challenges in the Internet of Things era, emphasizing the need for proactive measures and collective responsibility to address emerging risks and protect human safety.
Practical steps for securing big data installations, addressing challenges and vulnerabilities in velocity, variety, and volume. Explores security measures, authentication, and threat modeling.
Exploring Netflix's innovative approach to product security, emphasizing automation, DevOps culture, and continuous assessment for agile development in cloud environments.
Explore how online advertising networks can be exploited to create massive browser botnets, enabling DDoS attacks, spam campaigns, and password cracking without leaving traces. Learn about the scalability and potential risks of this attack scenario.
Explore RailsGoat, an OWASP project for Rails security training. Learn common vulnerabilities, remediation techniques, and attack scenarios aligned with the OWASP Top 10 using a purposely vulnerable Rails application.
Explore PhoneGap's security vulnerabilities, attack surfaces, and mitigation strategies for cross-platform mobile app development. Includes live demos, real-world examples, and practical recommendations.
Explore advanced exploitation techniques for SQL injection, XPath injection, cross-site scripting, and shell command injection using the Magical Code Injection Rainbow framework for configurable vulnerable applications.
Explore automated malware production techniques, tools, and methodologies used by attackers to generate thousands of threats daily, including a live demonstration of the process.
Discover key software security insights from Michael Howard's 18-year Microsoft journey, covering depreciation, friction reduction, network security, and practical strategies for robust development.
Get personalized course recommendations, track subjects and courses with reminders, and more.