Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Data Analysis
Microsoft Excel
Artificial Intelligence
An Introduction to Interactive Programming in Python (Part 1)
Excel: Fundamentos y herramientas
The Future of Work: Preparing for Disruption
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from 44CON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore modern Man-In-The-Middle attack techniques with MITMf, a Python framework combining new and old methods for efficient, extendable, and reliable network security testing.
Explore Black Hat's infrastructure, network challenges, and security measures. Learn about wired and wireless setups, threat modeling, and lessons for building robust conference networks.
Explore Android device security using a diverse cluster, addressing fragmentation challenges and enabling efficient vulnerability research and testing across multiple devices.
Explore GSM network vulnerabilities and attack tools that compromise phone calls, messaging, and web browsing. Learn about GSM architecture, weaknesses, and practical demonstrations of exploits.
Explore vulnerabilities in antivirus software, focusing on discovery and exploitation techniques. Learn about attack surfaces, fuzzing, and specific vulnerabilities in popular AV engines.
Explore x86 architecture for security research: privileges, events, hypervisors, and emerging tech. Gain foundational knowledge to streamline your research setup and focus on key questions.
Explore advanced incident remediation techniques for large network breaches, including mass remediation and outrunning the attacker. Learn from real-world experiences to effectively handle complex security incidents.
Explore security implications of HDMI protocols like CEC and HEC, including potential vulnerabilities and corporate risks. Includes demonstration of CEC security testing tool.
Explore common media mistakes in IT security reporting, analyzing causes and bridging the gap between journalists and security professionals.
Explore payment application security, from business processes to technical risks. Learn about attack surfaces, crypto-based countermeasures, and real-world solutions to protect financial transactions.
Exploring thermal imaging in information security: hacking a FLIR E4 for enhanced resolution and uncovering surprising heat signatures from computers.
Explore NoSQL database vulnerabilities and exploitation techniques for MongoDB, CouchDB, and Redis using the NoSQL Exploitation Framework. Learn about injection attacks, security issues, and automated penetration testing methods.
Explores modern techniques for enhancing wireless rogue AP attacks, including network spoofing and authentication interception. Introduces a new toolkit for implementing advanced attack strategies.
Exploring TR-069/CWMP vulnerabilities in residential gateways and ACS software, demonstrating potential for mass exploitation of consumer devices through ISP management systems.
Explore malicious document attacks, their evolution, and impact on cybersecurity. Learn about real-world techniques and strategies for defending against targeted attacks in enterprise networks.
Get personalized course recommendations, track subjects and courses with reminders, and more.