Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore strategies for achieving pharmaceutical compliance in cloud computing environments, addressing regulatory challenges and best practices for data security and integrity.
Explore IT security strategies through the lens of cat-and-mouse games and chess, examining tactical approaches for effective cybersecurity in this conference talk by Fabian Mosch.
Explore practical detection engineering strategies for multi-cloud environments, focusing on real-world applications and innovative approaches to enhance IT security across diverse platforms.
Explore the tension between security and privacy in IT systems, examining challenges and strategies for balancing these crucial aspects in modern technology landscapes.
Überblick über aktuelle IT-Sicherheitstrends und -bedrohungen aus der Perspektive von Heise, präsentiert auf der TROOPERS23-Konferenz. Einblicke in die sich entwickelnde Cybersicherheitslandschaft.
Explore SAP forensics techniques for detecting white-collar cybercrime, focusing on anti-forensics methods and investigative strategies in enterprise environments.
Explore techniques for auditing Jupyter notebooks to enhance AI security, focusing on identifying vulnerabilities and implementing best practices for safer AI development.
Explore cutting-edge authentication techniques and their security implications in this talk by Tamas Jos at the TROOPERS23 IT security conference in Heidelberg, Germany.
Explore techniques for extracting NTHashes from Azure AD, uncovering potential security vulnerabilities in cloud identity management systems.
Explore coercion techniques in Windows environments, their impact on IT security, and strategies for defense against these powerful attack vectors.
Explore effective prioritization strategies for IT security actions in this insightful conference talk by Mars Cheng and Dexter Chen at TROOPERS23.
Explore Windows Hello vulnerabilities and attack techniques in this IT security talk, covering biometric authentication weaknesses and potential exploits in Windows systems.
Explore hidden network pathways and security vulnerabilities in IT infrastructures with experts Jonas Bülow Knudsen and Alexander Schmitt at the TROOPERS23 conference in Heidelberg.
Explore reconnecting Active Directory with Azure AD after forest recovery, addressing challenges and best practices for seamless integration in hybrid environments.
Explore real-world cybersecurity challenges in the automotive sector through shocking case studies, revealing vulnerabilities and lessons learned for improved vehicle safety and data protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.