Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Information Technology
Communication Skills
Python
Multilingual Practices: Tackling Challenges and Creating Opportunities
Introduction to Linux
Financial Markets
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore consensual surveillance techniques and their applications in information security, featuring hands-on insights from DefCamp 2019's expert presentation on cutting-edge INFOSEC practices.
Explore post-quantum digital signatures using OQRNG, covering cryptography basics, quantum supremacy, hash-based signatures, and practical implementation with quantum random number generators.
Explore red team engagements and mobile device risks in cybersecurity. Learn about mobile app vulnerabilities, penetration testing tools, and offensive instrumentation techniques for enhanced security awareness.
Explore common misconceptions in securing DevOps, covering culture shifts, attack scenarios, and key strategies for building resilient systems in this DefCamp 2019 presentation.
Explore Windows graphics vulnerabilities through reverse engineering and fuzzing techniques, focusing on GDI components, patch analysis, EMF format, and effective fuzzing strategies.
Explore the journey of hacking a Honda vehicle, from initial assumptions to uncovering vulnerabilities. Learn about tools, techniques, and insights gained during this ethical hacking process.
Explore Linux malware packing, unpacking techniques, and emulation using Unicorn framework. Learn practical skills for malware analysis and reverse engineering in this hands-on cybersecurity talk.
Explore machine learning techniques for detecting complex threats in cybersecurity, focusing on APTs, technical controls, and innovative solutions using algorithms and data analysis.
Explore advanced persistent threats (APTs), their attack mechanisms, and detection strategies. Learn threat hunting techniques to uncover hidden network vulnerabilities and enhance cybersecurity defenses.
Practical guide to threat hunting, covering mindset, execution, and key considerations for cybersecurity professionals. Insights from DefCamp 2018 on enhancing defensive strategies.
Explore techniques for bypassing cryptography shields using Burp Suite, with insights on Java extensions and practical problem-solving approaches in information security.
Explore lattice-based Merkle for post-quantum cryptography, covering private/public-key encryption, quantum computers, signature schemes, and PRNG integration in this DefCamp 2018 talk.
Explore the WiFiCactus: innovative WiFi monitoring tool. Learn about its features, data capture, analysis techniques, and real-world applications in network security and hacking events.
Explore user-centric cybersecurity approaches, challenging traditional views and offering practical strategies to enhance organizational security through improved engagement and understanding.
Explore penetration testing techniques for privilege escalation, covering Windows systems, services, and common vulnerabilities. Learn practical approaches to identify and exploit security weaknesses.
Get personalized course recommendations, track subjects and courses with reminders, and more.