Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Management & Leadership
Introductory Human Physiology
Model Thinking
Exploratory Data Analysis with MATLAB
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore HTML5's potential for intranet exploitation with IBM's Javier Marcos de Prado & Juan Galiana Lara in this short, LASCON-offered program.
Explore the evolution of Bug Bounty Programs for web applications with Michael Coates from Mozilla, in this less than 1-hour material offered by LASCON.
Learn to detect defects in Ruby on Rails code using Brakeman & Jenkins in less than an hour with LASCON.
Learn basic pen testing techniques and how to use ZAP, the OWASP Zed Attack Proxy, in less than an hour with LASCON.
Learn to analyze and overcome secure .NET applications with Jon McCoy's hacking techniques. Offered by LASCON, this 1-2 hour material covers malware analysis, penetration testing, and reverse engineering.
Learn to simplify threat modeling with Mike Ware from Cigital in less than an hour, covering attack anatomy, threat traceability, and mitigation strategies. Offered by LASCON.
Improve your Software Development Life Cycle (SDLC) with CAPEC and CWE in less than an hour with LASCON's online material. Learn threat modeling, requirements analysis, and testing.
Learn to implement AppSensor in ModSecurity with Ryan Barnett from Trustwave SpiderLabs in less than an hour, offered by LASCON.
Learn risk assessment and management strategies from LASCON, with practical examples and peer review methods. Ideal for growing organizations. Less than 1-hour workload.
LASCON's short program challenges software professionals to adopt the Rugged approach for quality and excellence, with practical examples and a focus on various Rugged attributes.
Learn to combat cross-site scripting (XSS) using Content Security Policy (CSP) with this under 1-hour material from LASCON. Understand the differences between CSP 1.0 and 2.0, and how to implement them.
Learn secure coding techniques with LASCON's concise program. Master OWASP's top 10 proactive controls, from parameterizing queries to designing security architecture, in under an hour.
Learn to implement large-scale identity theft prevention solutions using AWS cloud infrastructure in under an hour with LASCON's expert, Kunal Anand.
Explore the history of public key cryptography with Stanford Professor Emeritus, Martin Hellman. In less than an hour, learn from his experiences and apply historical lessons to improve cyber security.
Explore mobile identity management, PIV derived credentials, and their deployment with LASCON. Learn about application use cases, best practices, and challenges in under 1 hour.
Get personalized course recommendations, track subjects and courses with reminders, and more.