Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the future of DevSecOps transformation, covering Agile methodologies, new roles, maturity models, and innovative approaches to pipeline engineering and quality feedback.
Explore a novel approach to web privacy protection through code-origin monitoring, offering customizable user safeguards and formal assurance mechanisms for JavaScript execution.
Explore web isolation's evolution, current approaches, and future challenges. Learn about a client-side sandboxing solution and discuss the future of web application security.
Explore the concept of Security-as-Code, a scalable approach to implementing security controls through codification, automation, and software engineering practices.
Explore innovative self-serve threat modeling techniques that empower development teams to identify and mitigate security risks independently, enhancing overall application security and efficiency.
Explore AppSec's 20-year journey: achievements, setbacks, and future prospects. Analyze trends, evaluate DevSecOps impact, and gain insights into the evolving landscape of application security.
Chris Wysopal explores AppSec's evolution from hacker-driven to a critical ally in software development, emphasizing the need for collaboration, shared accountability, and integrated security practices in modern development processes.
Explore application-level security control with Sanwaf, an alternative to traditional WAFs. Learn its structure, datatypes, and implementation for enhanced web application protection.
Explore techniques for detecting social media spam botnets using linkage analysis and machine learning, covering unsupervised and semi-supervised approaches and their applications.
Explore challenges developers face in application security, trust issues, and solutions for integrating security into the development process, with insights on tools and production biases.
Explore the intersection of open source software and vendor management, focusing on supplier risk, regulatory mandates, and strategies for mitigating potential threats in the software supply chain.
Explore common cryptographic vulnerabilities and learn practical techniques to exploit them, enhancing your understanding of secure implementation and potential attack vectors.
Learn how to implement real-time vulnerability alerting using principles from the US Tsunami Warning Center, covering triage methods, data analysis, and prioritization techniques.
Explore OWASP SAMM 2, a dynamic framework for software security. Learn principles, assessment tools, and critical success factors to enhance your organization's security maturity.
Explore IoTGoat, an OWASP project for IoT security testing. Learn about hardware compatibility, vulnerabilities, and hands-on techniques like firmware extraction and password cracking.
Get personalized course recommendations, track subjects and courses with reminders, and more.