Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn essential penetration testing techniques, focusing on human vulnerabilities and social engineering in cybersecurity. Explore real-world scenarios and strategies to strengthen organizational security.
Explore vulnerabilities in biometric recognition systems, including mobile authentication, spoofing techniques, and emerging technologies like blockchain, with insights on future developments and security challenges.
Automating security for startups using open-source tools to integrate dependency, code, and infrastructure protection without impeding progress or increasing developer workload.
Learn to identify and prevent application abuse by understanding adversary tactics and implementing effective security architecture in DevOps environments.
Insights on software supply chain practices, revealing vulnerabilities in open source components and strategies for improving application security in high-performance development organizations.
Explore common cryptography pitfalls, modern techniques, and tools to enhance system security. Learn about random number generation, hash functions, ciphers, and authentication protocols.
Explore the evolution and fundamentals of cryptography, from ancient ciphers to modern encryption methods, understanding their strengths and vulnerabilities.
Practical advice on improving physical security, covering common weaknesses, bypass techniques, vulnerability mapping, and cost-effective solutions for modern enterprises.
Explore malicious web bots, their impact on applications, and effective countermeasures using OWASP's Automated Threat Handbook. Learn to protect against unwanted automation and improve web security.
Explore purple team strategies to enhance app security programs, bridging defensive and offensive approaches for effective collaboration and improved security outcomes.
Explore physical security implementation for ISO 27002, covering human resources, asset management, and access control. Learn from real-world examples and gain insights on testing, remediation, and continuous improvement.
Explore HTTPS security enhancements, protocols, and tools to strengthen your website's encryption. Learn about free certificates and services for optimal implementation.
Explore how to leverage exposed APIs and plugin interfaces in software tools to enhance functionality, streamline workflows, and create custom solutions for improved efficiency and effectiveness.
Explore the anatomy of malware attacks, from deployment to key players involved. Gain insights into attack strategies, technologies used, and lessons for better cybersecurity preparedness.
Explore account takeover threats, their long-term impact, and effective defense strategies. Learn about hacking techniques, credential stuffing, and tools to protect against evolving cyber risks.
Get personalized course recommendations, track subjects and courses with reminders, and more.