Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore software supply chain vulnerabilities, focusing on SaaS security. Learn about access control, API restrictions, maturity evaluation, logging, cloud security, and code integrity.
Explore aviation security vulnerabilities through pen testing research, covering access risks, performance calculations, maintenance mode issues, and potential misunderstandings in the industry.
Explore effective third-party risk assessment beyond checklists. Learn to ask insightful questions that reveal an organization's commitment to security and trustworthiness in the software supply chain.
Explore common authentication pitfalls, costs, and phases. Learn about 2FA misconceptions, password security, and new guidelines for robust authentication practices in the digital age.
Explore cloud security vulnerabilities, historical incidents, and protective measures. Learn to identify abandoned subdomains and bypass firewalls in this eye-opening talk on hacker perspectives.
Explore why secure coding remains elusive, examining cultural issues, industry challenges, and potential solutions for integrating security into software development practices.
Explore deepfake technology's impact on cybersecurity, covering threats like fraud and fake content, as well as opportunities in biometrics and network traffic analysis.
Learn strategies for being a pioneering security engineer, covering impact, documentation, data storage, education, automation, and corporate security initiatives.
Explore CAN bus fundamentals and hands-on fuzzing techniques for automotive systems, covering ECUs, attack surfaces, and practical demonstrations using various tools and setups.
Explore badge hacking techniques, including card reader software, reading/writing cards, and security encryption, with practical insights and a Python script demonstration.
Explore VoIP phone vulnerabilities, attack methods, and security recommendations. Learn firmware access, emulation approaches, and exploit development for various VoIP devices.
Explore .NET assembly generation, embedding scripting languages, and advanced techniques for creating versatile payloads in this cybersecurity-focused talk on BYOI (Bring Your Own Interpreter).
Explore innovative approaches to enterprise security, focusing on visibility over control, with insights from Heroku's security transformation and practical lessons for implementation.
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Explore the complexities of global cyber norms, challenges in consensus-building, and potential risks in outsourcing digital governance frameworks.
Get personalized course recommendations, track subjects and courses with reminders, and more.