Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Communication Skills
Project Management
Language Learning
FinTech Ethics and Risks
Mining Massive Datasets
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore threat modeling for complex cloud systems, focusing on Linux containers and OpenStack. Learn innovative approaches beyond traditional data flow diagrams for effective security analysis.
Explore Perfect Forward Secrecy adoption levels across industries, understand its importance post-Heartbleed, and learn how to assess PFS maturity in your organization.
Explore JavaScript vulnerabilities, including unique issues, third-party platform exploits, and HTML5 security concerns. Learn about emerging threats and their impact on enterprise security.
Explore how bug bounty programs revolutionize cybersecurity by leveraging crowdsourced expertise, accelerating vulnerability detection, and fostering a security-aware culture in product development teams.
Explore runtime analysis and manipulation techniques for mobile app security testing, focusing on tools for iOS and Android to enhance your mobile security toolbox.
Explore strategies for integrating security into application projects, focusing on trade-offs, priorities, and communication between developers and security teams.
Insights into pitching security solutions to investors, sharing experiences and strategies for challenging industry incumbents with innovative ideas.
Exploring privacy's evolving nature, challenging preconceptions, and emphasizing its importance in digital security. Discusses Tor, cyberstalking, and the need for responsible digital citizenship.
Practical steps to enhance application security with minimal effort, including quick wins, finding attack surfaces, and engaging developers. Introduces a software security maturity model for measuring progress.
Explore the creation and applications of polyglots - data parsed as multiple formats. Learn techniques, historical uses, and future potential in computer security.
Explore agile security practices for rapid deployment in DevOps environments, covering infrastructure, APIs, and code security to keep pace with modern development cycles.
Learn to use GPG for secure communication, data encryption, and email protection. Explore key concepts like the Web of Trust, key management, and participate in key signing parties to establish authenticity.
Explore security vulnerabilities in DevOps tools and practices, including AWS, Chef, Puppet, and Jenkins. Learn about misconfigurations and potential risks in fast-paced development environments.
Automated security testing framework for OpenStack API, integrating with Agile and CI/CD. Demonstrates Rackspace's approach to detect vulnerabilities efficiently, improving consistency and auditability.
Explore network flow pattern analysis to detect and prevent contemporary threats, and learn how to build a security analytics program for enhanced threat visibility and response.
Get personalized course recommendations, track subjects and courses with reminders, and more.