Courses from 1000+ universities
Class Central experiments with cataloging online courses from California Community Colleges, offering diverse, affordable, and credit-worthy learning opportunities.
600 Free Google Certifications
Data Analysis
Digital Marketing
Ethical Hacking
Introducción a la inversión bursátil
Understanding the GDPR
Bitcoin and Cryptocurrency Technologies
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore global cybersecurity challenges and insights with Don A. Bailey's engaging presentation on international information security landscapes and cultural perspectives.
Explore terrorism, tracking, privacy, and human interactions through big data, wardriving, and wireless snooping. Learn about distributed devices, data analysis, and potential applications in marketing and surveillance.
Explore Windows 7 vulnerabilities and mobile device security with expert Alex Plaskett. Gain insights into potential exploits and learn strategies for protecting OEM systems.
Discover effective strategies for conveying complex security concepts to executives, enhancing communication and decision-making in information security leadership.
Unbiased analysis of Trusteer Rapport's security features, vulnerabilities, and effectiveness in protecting online banking transactions, presented by expert Neil Kettle.
Practical workshop on implementing effective logging systems for enhanced cybersecurity, featuring insights from NCSC experts and industry professionals.
Exploring the shift from viewing cybersecurity as risk to security debt, challenging traditional paradigms and proposing a new approach to articulate and measure software security benefits.
Explore Snuffleupagus, a new PHP security module for killing bug classes and virtual-patching vulnerabilities without modifying application code. Learn its features and implementation.
Explore novel techniques for bypassing 802.1x-2010 and MacSEC, discussing weaknesses in EAP and demonstrating improved methods for network penetration using the open-source tool Silent Bridge.
Explore machine learning techniques for efficient security code reviews, reducing false positives and automating vulnerability classification in large-scale applications.
Explore reverse engineering and bug hunting techniques for KMDF drivers, focusing on entry points, IO queues, and implementation vulnerabilities. Gain practical skills for analyzing driver security.
Explore innovative approaches to SecOps in challenging business environments. Learn new security practices and research to effectively manage operations despite limited resources and organizational resistance.
Explore techniques for integrating automated security testing into the development process, enabling faster releases while maintaining a strong understanding of application risks.
Explore red teaming skills, career paths, and the Fortis open-source lab for simulating enterprise environments. Learn to transition from pen testing and develop advanced cybersecurity techniques legally.
Explore the UK's Code of Practice for IoT security, addressing password issues, vulnerability disclosure, and software updates. Learn about future challenges and potential certification methods.
Get personalized course recommendations, track subjects and courses with reminders, and more.