Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Magecart's evolution, injection techniques, and threat complexity. Learn from real-world case studies and discover strategies to prevent these sophisticated web skimming attacks.
Explore advanced machine learning security concepts, including adversarial samples, attack strategies, and defensive techniques for various ML models.
Explore Uber's approach to message-level protection, including encryption strategies, crypto interfaces, and developer evangelism for secure data handling at scale.
Explore GDPR-compliant application logging practices, data privacy laws, and effective strategies for protecting sensitive information in production logs.
Learn to detect and automate insider threat prevention using behavior analytics, exploring UEBA, anomalies, and data-driven techniques for enhanced cybersecurity.
Explore common pitfalls in AppSec awareness programs and learn effective strategies for implementation, audience engagement, and sustainable security education.
Explore strategies for securing open-source projects before release, covering governance, code review, and infrastructure. Learn to address security concerns and manage community projects effectively.
Explore HTTP3 security with Robin Marx: handshakes, QuickSense, passive proxies, deep packet inspection, and QUIC vs TCP. Gain insights into the latest web protocol advancements.
Explore secure deserialization techniques and common vulnerabilities with practical demos, focusing on session cookies and big vulnerabilities in various platforms.
Explore WebAssembly's evolution, performance, and security implications, including its use in cryptojacking and potential future developments in web-based attacks.
Learn to create an effective threat modeling feedback system in Agile environments using OWASP principles. Explore frameworks, processes, and strategies for risk management and application security.
Explore mobile security essentials, including OWASP's Mobile AppSec Verification Standard and Testing Guide. Learn about network communication, data storage, and privacy requirements for robust app protection.
Explore strategies for security leaders to combat increasing breaches, from IoT vulnerabilities to phishing attacks. Learn essential skills and best practices for effective cybersecurity management.
Explore the future of cybersecurity with Mikko Hypponen, covering topics like data value, governmental attacks, cyber warfare, and emerging technologies like deepfakes and machine learning for defense.
Explore Content Security Policy's role in web security, covering script restrictions, TLS enforcement, and framing control. Learn best practices and developer insights for effective CSP implementation.
Get personalized course recommendations, track subjects and courses with reminders, and more.