Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Critique of penetration testing practices, exploring limitations, misconceptions, and potential harm in cybersecurity. Proposes alternative approaches and challenges industry norms.
Explore USB flash drive forensics, covering hardware, software, file systems, and forensic techniques. Learn about write blockers, Windows registry analysis, and open-source tools for digital investigations.
Explore SAP system vulnerabilities, compression algorithms, and attack techniques. Learn about authentication bypass, validation issues, and practical demonstrations for enhanced security awareness.
Explore software supply chain vulnerabilities, focusing on SaaS security. Learn about access control, API restrictions, maturity evaluation, logging, cloud security, and code integrity.
Explore aviation security vulnerabilities through pen testing research, covering access risks, performance calculations, maintenance mode issues, and potential misunderstandings in the industry.
Explore effective third-party risk assessment beyond checklists. Learn to ask insightful questions that reveal an organization's commitment to security and trustworthiness in the software supply chain.
Explore common authentication pitfalls, costs, and phases. Learn about 2FA misconceptions, password security, and new guidelines for robust authentication practices in the digital age.
Explore cloud security vulnerabilities, historical incidents, and protective measures. Learn to identify abandoned subdomains and bypass firewalls in this eye-opening talk on hacker perspectives.
Explore why secure coding remains elusive, examining cultural issues, industry challenges, and potential solutions for integrating security into software development practices.
Explore deepfake technology's impact on cybersecurity, covering threats like fraud and fake content, as well as opportunities in biometrics and network traffic analysis.
Learn strategies for being a pioneering security engineer, covering impact, documentation, data storage, education, automation, and corporate security initiatives.
Explore CAN bus fundamentals and hands-on fuzzing techniques for automotive systems, covering ECUs, attack surfaces, and practical demonstrations using various tools and setups.
Explore badge hacking techniques, including card reader software, reading/writing cards, and security encryption, with practical insights and a Python script demonstration.
Explore VoIP phone vulnerabilities, attack methods, and security recommendations. Learn firmware access, emulation approaches, and exploit development for various VoIP devices.
Explore .NET assembly generation, embedding scripting languages, and advanced techniques for creating versatile payloads in this cybersecurity-focused talk on BYOI (Bring Your Own Interpreter).
Get personalized course recommendations, track subjects and courses with reminders, and more.