Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the future of biometric technology with a focus on ECG (electrocardiogram) authentication, discussing its potential applications and implications for security.
Explore automated threats to web applications and strategies for mitigating risks in this insightful presentation on cybersecurity challenges and solutions.
Explore how HTTP headers can enhance web security, focusing on practical implementation strategies and best practices for developers and security professionals.
Discover how Mini Hardening competitions in Japan introduce security concepts to beginners, balancing technical challenges with business considerations in a one-day format.
Explore quantum computing's impact on cryptography, data protection strategies, and government surveillance. Learn about current developments, projects, and future implications for cybersecurity.
Learn to secure Angular applications by understanding common threats and implementing effective defenses. Covers script-based attacks, session management, CSRF, and more for robust client-side security.
Comprehensive analysis of JavaScript Object Signing and Encryption (JOSE) security, revealing critical vulnerabilities in popular libraries and introducing JOSEPH, an automated evaluation tool.
Explore seven strategies for detecting Authentication CSRF vulnerabilities, including a semi-automatic tool. Learn from real-world testing results on top websites and their security implications.
Explores vulnerabilities in mobile contactless payments, demonstrating card cloning and discussing attack vectors, risks, and mitigation strategies for secure mobile wallet implementation.
Explore pentesting techniques for voice biometrics, including tools for IVR automation, voice fuzzing, and bypassing algorithms. Learn security requirements and compare with traditional password methods.
Explore CORS misconfigurations and their security implications, including real-world attacks on bitcoin exchanges and Google. Learn about subtle vulnerabilities and exploit techniques for web security professionals.
Hands-on overview of implementing security in Azure deployments, covering best practices for various services and secure .NET application deployment.
Explore security risks in hybrid app development, combining native and web technologies. Learn defensive programming and testing strategies for secure cross-platform mobile applications.
Explore advanced domain hijacking techniques, including undisclosed methods, to understand vulnerabilities in DNS providers and cloud services. Learn to identify and mitigate risks beyond common subdomain takeover scenarios.
Explore OWASP's Mobile Application Verification Standard and Security Testing Guide, addressing key mobile app security challenges and best practices for secure data storage, communication, and API usage.
Get personalized course recommendations, track subjects and courses with reminders, and more.