Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical strategies for rapid and secure software development, addressing challenges in modern engineering organizations and emphasizing rugged software practices.
Explore quality assurance in penetration testing, addressing declining standards and providing guidance for improving security assessment practices and maintaining excellence in the field.
Explore tools and tips for effective penetration testing, from data collection to reporting, with insights on organization, documentation, and disaster recovery.
Exploring cybersecurity challenges in the Internet of Things era, emphasizing the need for proactive measures and collective responsibility to address emerging risks and protect human safety.
Practical steps for securing big data installations, addressing challenges and vulnerabilities in velocity, variety, and volume. Explores security measures, authentication, and threat modeling.
Exploring Netflix's innovative approach to product security, emphasizing automation, DevOps culture, and continuous assessment for agile development in cloud environments.
Explore how online advertising networks can be exploited to create massive browser botnets, enabling DDoS attacks, spam campaigns, and password cracking without leaving traces. Learn about the scalability and potential risks of this attack scenario.
Explore RailsGoat, an OWASP project for Rails security training. Learn common vulnerabilities, remediation techniques, and attack scenarios aligned with the OWASP Top 10 using a purposely vulnerable Rails application.
Explore PhoneGap's security vulnerabilities, attack surfaces, and mitigation strategies for cross-platform mobile app development. Includes live demos, real-world examples, and practical recommendations.
Explore advanced exploitation techniques for SQL injection, XPath injection, cross-site scripting, and shell command injection using the Magical Code Injection Rainbow framework for configurable vulnerable applications.
Explore automated malware production techniques, tools, and methodologies used by attackers to generate thousands of threats daily, including a live demonstration of the process.
Discover key software security insights from Michael Howard's 18-year Microsoft journey, covering depreciation, friction reduction, network security, and practical strategies for robust development.
Fast-paced hacking techniques and countermeasures: Learn about adversaries' evolving tools, tactics, and how to protect assets effectively. Explore rapid detection, patching, and risk management strategies.
Explore real-world examples of implementing successful security automation in fast-paced Agile development environments, focusing on practical strategies and processes.
Explore standards-based trust elevation in online identity using UMA and OpenID Connect for enhanced fraud mitigation and centralized authentication policies in web access management.
Get personalized course recommendations, track subjects and courses with reminders, and more.