Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Psychology
Digital Marketing
Academic Writing Made Easy
Improving Communication Skills
CS50's Introduction to Computer Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Fast-paced hacking techniques and countermeasures: Learn about adversaries' evolving tools, tactics, and how to protect assets effectively. Explore rapid detection, patching, and risk management strategies.
Explore real-world examples of implementing successful security automation in fast-paced Agile development environments, focusing on practical strategies and processes.
Explore standards-based trust elevation in online identity using UMA and OpenID Connect for enhanced fraud mitigation and centralized authentication policies in web access management.
Explore AI-powered API privacy using open-source tools. Learn about Privacy-by-Design, threat modeling, and leveraging deep neural networks to protect customer data in software development.
Explore mobile device security challenges, threats, and vulnerabilities in enterprise environments. Learn about the increasing importance of mobile security and strategies to protect against data breaches.
Discover how shifting security responsibility to the business can improve accountability, reduce friction, and prevent burnout among security engineers while enhancing overall company security.
Learn to secure modern API and microservices architectures with expert insights on key concerns, architectural patterns, and actionable solutions for robust application security.
Explore cloud-native app testing with the A's, B's, and Four C's framework, covering threat modeling, API testing, and security management for modern software development.
Explore Istio's solutions for micro-services challenges, including traffic management, policy enforcement, and security, to enhance scalability and operational efficiency.
Learn to build secure multi-cloud applications with modern techniques. Explore industry trends, development phases, and essential components like TLS, DNS, user management, and data encryption for robust cloud security.
Explore essential skills, objectives, and methodologies for successful Red Team operations, covering physical access, cloud infrastructure, and effective communication strategies.
Explore the evolution of online identity verification, from historical trends to current challenges and future opportunities, including AI and ML applications in authentication and access management.
Bridging the communication gap between security professionals and developers for successful DevSecOps adoption, with insights on common language and mutual understanding.
Explore a novel approach to automated malware analysis for file uploads in web apps, focusing on scalability, performance, and effective detection of malicious content.
Applying adversarial threat models to supply chain systems, focusing on geo-political risks and industry-specific threats to build effective threat libraries and attack sequences for improved security.
Get personalized course recommendations, track subjects and courses with reminders, and more.