Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Software Development
Data Analysis
Computer Science
Mindshift: Break Through Obstacles to Learning and Discover Your Hidden Potential
Understanding the GDPR
Functional Foods and Nutraceuticals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Automating security for startups using open-source tools to integrate dependency, code, and infrastructure protection without impeding progress or increasing developer workload.
Learn to identify and prevent application abuse by understanding adversary tactics and implementing effective security architecture in DevOps environments.
Insights on software supply chain practices, revealing vulnerabilities in open source components and strategies for improving application security in high-performance development organizations.
Explore common cryptography pitfalls, modern techniques, and tools to enhance system security. Learn about random number generation, hash functions, ciphers, and authentication protocols.
Explore the evolution and fundamentals of cryptography, from ancient ciphers to modern encryption methods, understanding their strengths and vulnerabilities.
Practical advice on improving physical security, covering common weaknesses, bypass techniques, vulnerability mapping, and cost-effective solutions for modern enterprises.
Explore malicious web bots, their impact on applications, and effective countermeasures using OWASP's Automated Threat Handbook. Learn to protect against unwanted automation and improve web security.
Explore purple team strategies to enhance app security programs, bridging defensive and offensive approaches for effective collaboration and improved security outcomes.
Explore physical security implementation for ISO 27002, covering human resources, asset management, and access control. Learn from real-world examples and gain insights on testing, remediation, and continuous improvement.
Explore HTTPS security enhancements, protocols, and tools to strengthen your website's encryption. Learn about free certificates and services for optimal implementation.
Explore how to leverage exposed APIs and plugin interfaces in software tools to enhance functionality, streamline workflows, and create custom solutions for improved efficiency and effectiveness.
Explore the anatomy of malware attacks, from deployment to key players involved. Gain insights into attack strategies, technologies used, and lessons for better cybersecurity preparedness.
Explore account takeover threats, their long-term impact, and effective defense strategies. Learn about hacking techniques, credential stuffing, and tools to protect against evolving cyber risks.
Explore Kubernetes fundamentals, security challenges, and best practices for container orchestration in this crash course, covering clusters, data management, and potential pitfalls.
Explore strategies for integrating security into DevOps pipelines, focusing on attack surface monitoring, automated testing, and merging static and dynamic results.
Get personalized course recommendations, track subjects and courses with reminders, and more.