Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore innovative approaches to enterprise security, focusing on visibility over control, with insights from Heroku's security transformation and practical lessons for implementation.
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Explore the complexities of global cyber norms, challenges in consensus-building, and potential risks in outsourcing digital governance frameworks.
Explore risk management in security, challenging misconceptions and revealing its value. Learn to interpret, measure, and leverage risk effectively for better organizational outcomes.
Explore big data analysis for cybersecurity using Hadoop, tackling malware, network traffic, and log files at scale to overcome processing limitations and enhance threat detection.
Explore innovative approaches to security awareness training, focusing on social engineering techniques to create positive change and effective communication strategies for lasting impact.
Aprenda a evitar erros comuns na resposta a incidentes de segurança cibernética, com foco em preservação de evidências, análise de dados e estratégias eficazes de contenção.
Explore ARM exploitation, reverse engineering, and vulnerability analysis through the lens of hacking an internet-enabled rabbit toy, uncovering authentication bypasses and remote code execution bugs.
Explore bug bounty dynamics, structure, and benefits for both hunters and companies. Learn strategies for successful programs and navigating challenges in this evolving cybersecurity landscape.
Learn to transform your phone into a low-cost IMSI catcher detector. Explore mobile security vulnerabilities, silent SMS detection, and IMSI catcher identification techniques in this comprehensive tutorial.
Dive deep into Meterpreter's inner workings, exploring its lifecycle, Reflective DLL Injection, and migration techniques. Gain technical insights into this powerful Metasploit payload for Windows systems.
Explore creative problem-solving and repurposing through the lens of building a bionic hand from a coffee maker. Learn innovative approaches to finding potential in everyday objects.
Novel USB attacks for remote control of air-gapped machines with minimal forensic footprint. Explores stealthy bi-directional channels, remote connectivity, and offloading complexity to hardware. Releases open-source toolset using freely available hardwa…
Explore JTAG exploitation techniques for rooting devices, covering physical layer access, data protocols, and advanced memory analysis for security professionals.
Explore malware analysis techniques, from detection to eradication, using free tools. Learn to identify indicators of compromise and effectively remove threats from enterprise networks.
Get personalized course recommendations, track subjects and courses with reminders, and more.