Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Integrating OWASP ASVS into the secure software development lifecycle to create uniform security requirements, prioritize tasks, and track adherence across applications using existing tools and processes.
Extensive analysis of malicious domain registrations in .eu TLD, revealing cybercriminal tactics and campaign patterns. Insights into automated processes and operational aspects of large-scale malicious activities.
Explore the journey of setting up an AppSec pipeline using Docker containers, addressing challenges, managing false positives, and optimizing security tools for seamless integration with development teams.
Explore the hidden dangers of browser extensions, their security model limitations, and potential risks to user privacy. Learn about real-world analysis findings and discuss improved security measures.
Explore infamous data breaches, their technical vulnerabilities, and preventive coding solutions. Learn practical techniques to enhance application security and avoid costly mistakes in your development process.
Explore methods for calculating and tracking web application attack surface evolution, and learn to integrate security testing into CI/CD pipelines using metrics-based policies.
Practical guide to integrating GDPR requirements into software development lifecycle, covering privacy awareness, risk analysis, secure coding, threat modeling, and breach notification processes.
Explore strategies for securing C codebases in high-performance environments, balancing best practices with startup culture. Learn from real-world successes and failures in implementing application security controls.
Explores limitations of current code injection prevention methods and introduces Name Space Layout Randomization (NSLR) as a novel approach to secure Java applications against known and zero-day vulnerabilities.
Streamline vulnerability management with DefectDojo: automate reporting, metrics, and scanner consolidation. Learn how this open-source tool can enhance your AppSec program's efficiency and effectiveness.
Explore a programmatic approach to reliably detect CSRF vulnerabilities in web applications, overcoming common shortcomings of existing tools and improving automated security testing.
Introducing a new SDL approach: End-to-End Security Engineering. Covers full product lifecycle, defines 'perfect secure system', and produces metrics to measure security state at each point. Focuses on collective understanding and effectiveness.
Strategies for implementing a continuous AppSec program that integrates security initiatives, enables DevOps, and addresses portfolio-wide coverage while prioritizing risks and fostering continuous improvement.
Explore how blockchain technology can revolutionize identity and authentication in IoT, enhancing security through decentralized, immutable ledgers and innovative approaches to personal data management.
Explore Netflix's innovative approach to AWS security group management using Grouper and Dredge, enhancing developer insights and ensuring least privilege network access.
Get personalized course recommendations, track subjects and courses with reminders, and more.