Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for hacking .NET applications, including malware analysis, code review, and penetration testing. Learn to build keygens, cracks, and overcome security measures in .NET environments.
Simplified approach to threat modeling: identify attack surfaces, visualize users as threats, illuminate assets and trust boundaries, postulate attacks, evaluate impact, and mitigate risks.
Enhance software development lifecycle using CAPEC and CWE. Learn threat modeling, design considerations, and security testing techniques to improve application security.
Explore advanced web application security techniques using AppSensor and ModSecurity, focusing on detection points, SQL injection prevention, and innovative defense strategies.
Explore effective risk management strategies for growing organizations, focusing on peer review, communication, and automation to maintain high uptime standards without sacrificing velocity.
Explore the Rugged paradigm for software excellence, focusing on quality, collaboration, and transparency. Learn practical ways to implement Rugged attributes in daily professional life.
Explore Content Security Policy (CSP) as a defense against XSS attacks, comparing CSP 1.0 and 2.0, and learn implementation strategies for enhanced web application security.
Comprehensive guide to OWASP Top 10 Proactive Controls for secure software development, covering essential techniques from query parameterization to threat modeling, presented by expert Jim Manico.
Explore a distributed platform on AWS for preventing identity theft, session hijacking, and MitM attacks. Learn about polyglot architecture, custom caching, and strategies for improved resiliency and business continuity.
Historical lessons for improving cybersecurity: outsiders' role in cryptography advances, attention to seemingly foolish ideas, and applying risk analysis from nuclear deterrence to cryptography.
Explore derived credentials for secure mobile applications, covering PIV standards, deployment architecture, use cases, and best practices for enhanced user experience in enterprise and government settings.
Explore multi-factor authentication solutions, evaluation criteria, and implementation considerations for stronger security. Gain insights into market offerings and their credibility.
Pragmatic approaches and tools for ruggedizing your development lifecycle, from code commit to running system. Learn solutions for secure, resilient applications in fast-paced environments.
Discover techniques to detect ongoing network breaches, analyze anomalous behavior, and eradicate threats from Red Team experts turned Blue Team specialists.
Practical strategies for rapid and secure software development, addressing challenges in modern engineering organizations and emphasizing rugged software practices.
Get personalized course recommendations, track subjects and courses with reminders, and more.