Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore federal security standards for improved InfoSec practices. Learn key principles like defining security boundaries, creating functional specifications, and protecting critical parameters and network traffic.
Explore innovative physical perimeter defense using software-defined radio to detect potential threats by simulating cell tower signals, enabling early reconnaissance identification and post-breach investigation.
Innovative black-box taint tracking system for detecting user input data injection in commands and SQL queries, offering cost-effective and performant runtime protection without code modifications.
Insights on scaling XSS remediation across GitHub open source projects, focusing on risk reduction, adding security controls, and automating code modification for diverse applications.
Learn iOS app security through hands-on exercises with iGoat, an open-source tool for developers and pentesters. Explore vulnerabilities, exploit techniques, and implement fixes in a safe environment.
Introduces a new method for detecting vulnerabilities in aspect-oriented web applications, focusing on static tainting analysis to improve security in languages like AspectJ.
Explores vulnerabilities in NoSQL databases, comparing threats to traditional SQL systems and demonstrating new attacks exploiting complex data types like JSON to bypass application-level access controls.
Turbocharge web hacking with HUNT, a Burp Suite extension using real threat intelligence to provide parameter-level vulnerability suggestions and organize testing methodologies for more thorough assessments.
Introducing ReproNow: an open-source tool for efficiently reproducing and triaging security vulnerabilities. This chrome/firefox extension captures researcher's walkthrough, including network requests, streamlining bug validation for security engineers.
Explore JSON parser vulnerabilities in .NET and Java, including RCE risks. Learn about attack techniques, vulnerable formats, and mitigation strategies for safer serialization implementations.
Explore HTTP/2 protocol nuances for passive client fingerprinting. Learn about implementation differences, potential use cases, and observed attacks on Akamai's platform.
Comprehensive review of OWASP Project and Chapter Leaders' working session, discussing key decisions and actions affecting global operations. Essential viewing for OWASP leadership.
Explore fascinating side-channel attacks and low-cost tools used against modern technology. Learn about innovative hacking methods and how to secure against them from renowned security researcher Samy Kamkar.
Exploring software supply chain lifecycle management to reduce attack vectors and enable rugged DevOps, focusing on IoT security, third-party software risks, and standards-based automation for threat detection.
Humorous guide on counterproductive workplace behaviors, highlighting common mistakes to avoid for better professional relationships and team dynamics.
Get personalized course recommendations, track subjects and courses with reminders, and more.