Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Management & Leadership
Data Analysis
Cybersecurity
Introducción a la inversión bursátil
Astrobiology and the Search for Extraterrestrial Life
Improving Your Study Techniques
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the intersection of modern application security and generative AI, assessing readiness for emerging challenges in the evolving tech landscape.
Explore network forensics techniques and open-source tools for investigating web server compromises, analyzing captured traffic, and reconstructing malicious sessions to uncover digital evidence.
Explore the 3Rs approach to enhance CI/CD secrets security: Reduce stored secrets, use short-lived credentials, and prevent leaks in source code. Practical tips for implementing these principles across various platforms.
Comprehensive approach to managing attack surfaces in large-scale applications, covering APIs, web services, and mobile apps. Explores techniques, challenges, and lessons learned for effective security implementation.
Explores techniques used by cybercriminals to target software engineers, highlighting vulnerabilities in the software supply chain and providing protective strategies for developers.
Explore scratch containers, their benefits in reducing vulnerabilities, and potential challenges in software composition analysis. Learn about security implications for containerized applications.
Learn how to integrate API security assurance into end-to-end testing, empowering engineers to identify security edge cases and continuously design secure applications from the MVP stage.
Learn to dynamically assess and prioritize application security risks in your organization. Discover a framework for identifying new apps and significant changes to maintain an up-to-date risk profile.
Explore how LLMs and generative AI can revolutionize software vulnerability remediation, empowering security teams to create and validate fixes without extensive developer experience or access.
Practical insights for improving application security through better tooling, processes, and design patterns. Learn from past failures to create a more secure future for web applications.
Learn to create a specialized incident response plan for software supply chain attacks, focusing on AppSec-related incidents and their unique characteristics compared to traditional cybersecurity threats.
Explore security challenges in AI and ML systems, including adversarial attacks and MLOps. Learn to apply pen testing skills to ML, with demonstrations on manipulating image recognition and NLP models.
Strategies for scaling container vulnerability scans: risk assessment, streamlined triage, automation, and data-driven insights to manage CVEs effectively in large-scale environments.
Explore Coraza, an open-source WAF for Kubernetes & Istio. Learn integration, safe rollout, scalability, and performance optimization for high-volume request handling as a ModSecurity alternative.
Explore the emerging threat of socially-motivated cyber criminals, their tactics, and impact on targets. Learn how to understand and defend against this new breed of networked adversaries in the digital landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.