Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Learn to implement OWASP Core Rule Set for high-security web applications, covering WAFs, ModSecurity, logging, whitelisting, and advanced protection techniques.
Learn techniques to identify and prevent security vulnerabilities through variant analysis, code navigation, and automation, using real-world examples and practical strategies.
Learn strategies for elevating security without formal authority, including technical approaches and cultural tactics to influence stakeholders and drive positive change in organizational security practices.
Explore usable IoT security design principles to create user-friendly, effective protection. Learn strategies for clear communication, secure defaults, and seamless integration of security measures.
Learn to select effective static code analyzers using data-driven insights, exploring tool capabilities, integration, coverage, and result quality for improved software security.
Explore JavaScript frameworks' impact on application security, analyzing mitigation levels, case studies, and CSRF protection across popular frameworks like Meteor.
Explore modern IAM strategies for enhanced application security, covering OpenID, JSON Web Tokens, SAML, and FIDO protocols, with practical insights and a demo.
Explore cloud-native security pipelines, comparing traditional and modern approaches, while addressing challenges in container orchestration, access control, and CI/CD processes.
Explore the security aspects of decentralized applications (DApps) and smart contracts, covering tools, vulnerabilities, and standards across the development lifecycle.
Discover how a cybersecurity expert thwarted a terrorist hack on an embassy, exploring the incident's origins, diplomatic implications, and crucial lessons for global security.
Explore security vulnerabilities decomposition, focusing on SQL injection, secure data handling, and design patterns for payment gateways and single sign-on. Learn practical security controls for secure development.
Explore vulnerabilities in client-side storage, including cookies and web storage, and learn exploit patterns and attack vectors to enhance web application security.
Explore credential stuffing, account takeovers, and evolving cybersecurity threats. Learn about attack methods, defense strategies, and the future of online fraud prevention.
Explore security engineering principles for complex systems, focusing on composite elements, interactions, and dependencies across the system lifecycle, illustrated with a Smart City transit example.
Exploración crÃtica de la persistencia del XSS, analizando su historia, fracasos en su mitigación y factores que contribuyen a su continuidad. Se cuestiona su relevancia actual y se proponen reflexiones sobre el futuro de la seguridad web.
Get personalized course recommendations, track subjects and courses with reminders, and more.