Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Practical guidance on implementing secure Java web applications using Spring Security and Apache Fortress. Covers authentication, authorization, and confidentiality controls with hands-on demos and code examples.
Integrating security into existing development workflows for efficient vulnerability management and faster response times. Learn how to leverage automation and project tracking tools to enhance security practices.
Explore open-source tools for securing Kubernetes applications, covering image scanning, runtime security, and anomaly detection. Learn practical strategies for maintaining a secure cloud-native environment.
Integrating third-party library scanning in DevOps: automation strategies, architectural choices, and best practices for secure development at scale. Tips for seamless implementation and measuring success.
Automated security code review tool for early detection of organization-specific vulnerabilities, integrated with GitHub PR process. Provides real-time feedback and actionable guidance for developers.
Learn efficient, value-driven threat modeling techniques to embed secure design in products from the start. Discover how to integrate security into agile development and prioritize vulnerabilities effectively.
Explore strategies to make security more accessible for developers and operators through APIs, secure-by-default platforms, and policy as code, enhancing overall security posture.
Explore modern defense strategies for complex digital ecosystems, focusing on designing defensible systems beyond traditional perimeter security to protect platforms, applications, and services at internet scale.
Discover hidden browser vulnerabilities with the Hackability Inspector, a new offensive toolkit for security researchers to explore and exploit unknown entities in embedded browsers.
Explore HTTPS side-channel vulnerabilities and a new tool, FIESTA, for testing and exploiting these issues. Learn about a novel side-channel affecting major tech companies and its implications for online security.
Explore OWASP's comprehensive tools and guides for building secure software throughout the development lifecycle, from policy creation to implementation and verification.
Explore TLS 1.3's security enhancements, new protocol handshakes, and 0-RTT resumption. Learn about potential deployment pitfalls and how to avoid them in this comprehensive overview of the latest TLS version.
Optimize pentesting resources with Hunter, an open-source tool grading websites for low-risk security issues. Learn how eBay saved 10-15% of their pentesting budget and improved efficiency.
Insights from building threat modeling practices across organizations, focusing on reducing design errors. Explores lessons learned, challenges faced, and strategies for effective implementation in software security.
Explore healthcare cybersecurity challenges and their impact on patient safety. Learn how integrating clinicians with software developers can address risks in an increasingly connected medical landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.