Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical tips for running a successful bug bounty program, including scope definition, communication strategies, and vulnerability rating. Insights from experienced professionals on managing crowdsourced security testing effectively.
Explore limitations of SMS-based authentication and discover more secure alternatives using push notifications for improved user experience and enhanced security in two-factor authentication.
Explores authentication and self-announcement patterns in IoT, addressing unique security challenges due to physical access, limited computation power, system vulnerabilities, and privacy concerns in various IoT scenarios.
Discover Needle, an open-source framework for streamlined iOS app security assessments. Learn about its modular architecture, capabilities, and how it simplifies vulnerability detection in iOS applications.
Explores vulnerabilities in Bluetooth Low Energy communication between wearables and mobile apps, highlighting encryption weaknesses and proposing secure design strategies.
Explore best practices for structuring effective bug bounty programs, addressing concerns like security, privacy, and legal issues while maximizing vulnerability identification.
Explore containerizing security operations for improved deployment, maintenance, and collaboration. Learn to build a cloud-based SOC using containers, enhancing visibility and streamlining security workflows.
Learn to scale security assessments for DevOps with Norad, a distributed testing framework. Automate open-source and vendor tools, aggregate results, and develop custom security tests using the SDK.
Practical tips for adapting web application security to agile and DevOps environments, focusing on lightweight controls, visibility, and measuring maturity in modern development practices.
Explore system call profiling for containerized application security. Learn to develop accurate profiles, monitor runtime behavior, and detect anomalies with low performance overhead and false positives.
Comprehensive analysis of Docker security vulnerabilities and best practices for securing containerized environments, covering image security, runtime protection, and ecosystem tools.
Comprehensive overview of modern HTTPS and TLS security practices, covering protocol vulnerabilities, certificate fundamentals, and best practices for implementing strong encryption in web services.
Explore perspectives on building, configuring, and securing software from developers, operations, and security experts. Learn strategies for collaboration, empathy, and optimizing workflows across teams.
Interactive code review techniques using debugging for efficient and effective application security testing, combining penetration testing and code review benefits.
Explore CORS misconfiguration vulnerabilities and the challenges of implementing advanced browser security features, with insights on balancing security and operational complexity.
Get personalized course recommendations, track subjects and courses with reminders, and more.