Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores DNS as critical infrastructure, examining its evolution, security measures, and operational challenges. Analyzes ccTLD operations, hosting risks, and adoption of security features like DNSSEC and CAA records.
Explore CommandGPT's potential in offensive security, leveraging AI for dynamic code generation in command and control frameworks and simulating ransomware techniques.
Explore real-world physical penetration testing experiences across diverse facilities, from banks to cheese factories. Gain insights into security vulnerabilities and unconventional tactics used in red team operations.
Explore OSDP access control protocol, its functionality, and security implications. Learn to interface with devices and audit implementations for potential vulnerabilities.
Explore the security vulnerabilities and potential risks associated with eSIM technology in mobile phones and desktop devices, raising awareness about offensive operations and post-compromise scenarios.
Dive into the reverse engineering process of a popular EV charger, exploring firmware analysis, custom bootloader creation, and potential security improvements in this insightful presentation.
Explore the 15-year evolution of mobile malware, from Symbian OS to Android, examining shifting trends and current threats in this comprehensive keynote on mobile security.
Novel attacks exploiting Wi-Fi sleep mode to leak encrypted frames and disrupt networks. Demonstrates vulnerabilities in WPA2/3, impacts on geofencing, and client isolation bypasses. Discusses potential mitigations and security trade-offs.
Explore the future of cybersecurity as automated malware campaigns face off against AI-powered defenses. Learn how the battle between good and bad AI will shape the landscape of digital security.
Explore firmware vulnerabilities in critical infrastructure using open-source tools. Learn techniques for deep security analysis, uncovering risks, and leveraging AI to simplify research and reverse engineering.
Innovative Micro Attack Simulations approach for validating specific security controls, enhancing cyber resilience through targeted assessments of technical and non-technical aspects, demonstrated with a ransomware attack case study.
Analyze the Vulkan Leaks' impact on cybersecurity, exploring historical context and critical implications for threat intelligence and network defense strategies.
Explore the most significant cybersecurity events, active threat actors, and surprising facts from 2022-2023 in this comprehensive overview of the rapidly evolving digital security landscape.
Optimizing threat intelligence with MISP: Learn to curate, contextualize, and automate TI feeds for actionable insights, reducing false positives and enhancing SOC, IR, and malware analysis collaboration.
Explore the Cyber Threat Intelligence Analyst role, its competencies, and how it intersects with other cybersecurity disciplines to enhance collaboration and organizational security posture.
Get personalized course recommendations, track subjects and courses with reminders, and more.