Courses from 1000+ universities
The future of Coursera’s only credible alternative for universities rests in the hands of 2U’s creditors.
600 Free Google Certifications
Web Development
Data Analysis
Python
Applied Scrum for Agile Project Management
The Art of Structural Engineering: Vaults
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from LASCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore SEO risks, strategies, and best practices for online businesses, covering topics from negative SEO to content quality and user experience optimization.
Explore serverless computing's impact on security, covering key areas like software supply chain and attack detection. Learn practical approaches and see a demo of building and securing a serverless application.
Explore software security assurance, application security, and organizational strategies for effective resource planning and process building in cybersecurity.
Learn techniques for hiding data from surveillance using distributed steganography, exploring methods like hidden files, alternate data streams, and encryption combined with steganographic approaches.
Explore the differences and complementary roles of WAF and RASP in application security, understanding their strengths and limitations for comprehensive protection.
Explore API security challenges, threats, and enterprise-scale solutions. Learn about modern attack surfaces, recent breaches, and effective strategies for protecting sensitive data in API-driven architectures.
Explore web application reverse engineering techniques, from information gathering to active testing, to understand behavior, analyze code, and improve security assessments.
Explore web malware anatomy, impact, and detection techniques. Learn about browser vulnerabilities, drive-by downloads, and real-world case studies of exploit kits and botnets.
Explore SSL's role in online security, challenges with certificate authorities, and innovative approaches to authentication in the digital age.
Explore threat modeling for cloud applications, focusing on AWS services, security controls, and potential risks. Learn to identify assets, adapt to cloud architectures, and address new security challenges.
Explore Android security vulnerabilities, reverse engineering techniques, and potential solutions with insights from Trustwave SpiderLabs expert Mike Park.
Explore messaging security in GlassFish and Open Message Queue, covering authentication, authorization, encryption, persistence, logging, and monitoring for robust enterprise messaging systems.
Explore HTML5's potential for intranet exploitation using BeEF framework. Learn footprinting, network discovery, port scanning, and inter-protocol exploitation techniques.
Explore the evolution of web security through bug bounty programs, focusing on Mozilla's experience, benefits, challenges, and ethical considerations.
Explore static analysis tools for Ruby on Rails, focusing on Brakeman and Jenkins integration. Learn about security warnings, code updates, and best practices for detecting defects.
Get personalized course recommendations, track subjects and courses with reminders, and more.