Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore the potential of Twitter data to reveal psychopathic traits in killers. Delve into psychological research, profiling techniques, and the intersection of social media and criminal behavior analysis.
Maximizing home-field advantage in cybersecurity through proactive defense, intelligence gathering, and attacker modeling. Learn to adapt strategies, set traps, and take initiative for effective protection.
Explore vulnerabilities in mobile point-of-sale systems, including MitM attacks, arbitrary code injection, and firmware exploitation. Learn to identify weaknesses and conduct security assessments in payment technologies.
Explore network exploitation using Scratch programming language, extending its capabilities to create exploits and fuzz vulnerable services through custom TCP/IP function blocks.
Explore SmartNIC-based data center security, featuring improved isolation, offload capabilities, and policy scaling. Learn about innovative host introspection techniques for enhanced threat detection and workload integrity.
Explore hacking techniques for machine learning systems in speech, text, and facial recognition, including exploits, backdoors, and adversarial attacks. Live demo included.
Explore ephemeral vulnerabilities in bug bounties, their impact, and how to identify and exploit them. Learn from real-world examples and strategies for continuous security assessment.
Comprehensive workshop on ARM assembly and shellcode creation, covering basics, execve() shell, and reverse shell. Includes hands-on practice with QEMU emulator and Raspberry Pi hardware.
Explore Java's Remote Method Invocation security vulnerabilities, enumeration techniques, and exploitation tools with BaRMIe. Learn about common mistakes and potential solutions in RMI implementations.
Explore Subgraph OS: a hardened Linux desktop with advanced security features, including kernel protection, application sandboxing, and network safeguards.
Explore Cisco ASA internals, reverse engineering techniques, and custom tools for exploit development. Gain insights into vulnerability analysis and mitigation strategies for network security professionals.
Explore techniques for attacking Microsoft Advanced Threat Analytics, including alert suppression, identity exemption, and remote control. Learn about ATA's vulnerabilities and defensive strategies.
Explore HiTag2 RFID encryption vulnerabilities and learn to implement attacks for cloning secure building access tags, based on academic research and practical demonstrations.
Explore motherboard intricacies, security features, and hidden functionalities. Uncover potential exploits, design pitfalls, and challenges in hardware security through chipset analysis and datasheet discoveries.
Explore the cryptanalysis of the Enigma machine, its historical significance, and the techniques used to break its code during World War II.
Get personalized course recommendations, track subjects and courses with reminders, and more.