Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore telecom espionage tactics and vulnerabilities in this IT security talk, uncovering threats to communication networks and discussing protective measures.
Explore vulnerabilities in TPM 2.0 reference implementation with Francisco Falcon. Gain insights into IT security risks and potential exploits in this critical component.
Explore advanced techniques for obfuscating Android apps using native code, enhancing security and protecting intellectual property in mobile app development.
Explore GPT-like pre-training on system logs for enhanced malware detection. Learn innovative techniques to leverage unlabeled data and improve cybersecurity defenses against evolving threats.
Explore cloud security with Sapir Federovsky's talk on Reportly at TROOPERS23, focusing on innovative approaches to maintain vigilance in cloud environments.
Explore homophonic collisions in IT security with Justin Ibarra and Reagan Short. Gain insights into this unique aspect of cybersecurity from experts at a leading conference.
Explore OAuth security enhancements and Proof of Possession techniques for improved authentication and authorization in modern applications.
Explore detection and blocking techniques using BPF and YAML for enhanced IT security. Learn innovative approaches to protect systems and networks effectively.
Forensic analysis techniques for investigating security incidents within Microsoft Remote Desktop Services, based on real-world case studies and practical insights.
Explore Windows telemetry's inner workings, data collection methods, and security implications in this advanced IT security talk. Gain insights to enhance system privacy and protection.
Explore techniques for testing and fuzzing Kubernetes admission configurations to enhance security and identify vulnerabilities in container orchestration systems.
Explore SAP's Remote Function Call (RFC) protocol: its functionality, security implications, and potential vulnerabilities. Gain insights for better understanding and securing SAP systems.
Explore APT operations security failures, from minor mistakes to catastrophic blunders, in this eye-opening analysis of real-world cybersecurity incidents and their consequences.
Explore security vulnerabilities in parcel delivery systems and learn strategies to protect against potential threats in this insightful IT security conference talk.
Explore security vulnerabilities in Ultra-Wideband technology for smartphones, analyzing potential attacks and their implications for user privacy and device security.
Get personalized course recommendations, track subjects and courses with reminders, and more.