Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore effective strategies for security leaders to combat widespread breaches, covering policies, monitoring, patching, and disaster recovery in today's threat landscape.
Exploring the journey towards free SSL/TLS certificates, this talk discusses the challenges, intentions, and implications of widespread HTTPS adoption for web security and privacy.
Explore network forensics techniques and open-source tools for investigating web server compromises, analyzing captured traffic, and reconstructing malicious sessions to uncover digital evidence.
Explore the intersection of modern application security and generative AI, assessing readiness for emerging challenges in the evolving tech landscape.
Explore cutting-edge mobile security topics at AppSecEU 2014, covering iOS and Android vulnerabilities, OWASP Mobile Top Ten, smart storage scanning, and practical defense strategies for app developers.
Explore MITM phishing toolkits, their threat models, and detection methods. Learn about network-level analysis, classifiers, and countermeasures to enhance cybersecurity defenses.
Explore container security, from Docker to Kubernetes, covering breakout vulnerabilities, networking challenges, and RBAC. Gain insights into potential threats and future attack vectors in containerized environments.
Explore SAST testability patterns, their impact on code security, and strategies for improving vulnerability detection in web development.
Learn to identify and mitigate vulnerabilities in software dependencies using OWASP Dependency-Check, enhancing application security through effective composition analysis.
Learn about OWASP DefectDojo, an open-source application security management tool. Explore its features, automation capabilities, deployment options, and community-driven development.
Explore OWASP Juice Shop, a vulnerable web application for security training. Learn about challenges, cross-site scripting, coding exercises, and future enhancements in this comprehensive overview.
Explore key security challenges and best practices for cloud-native applications, focusing on OWASP's top 10 vulnerabilities and mitigation strategies.
Explore OWASP Amass, a powerful tool for information gathering and external asset discovery in cybersecurity. Learn its features, data sources, and future developments.
Explore the OWASP Security Knowledge Framework, its features, and security lifecycle. Learn about OSS projects, demo labs, and expert wizards for enhancing application security.
Explore OWASP ModSecurity Core Rule Set: web application firewall rules, paranoia levels, and project developments for enhanced security and threat protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.