Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Communication Skills
Project Management
Graphic Design
Functional Programming Principles in Scala
Supporting Successful Learning in Primary School
Transport Systems: Global Issues and Future Innovations
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from BruCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explores DNS as critical infrastructure, examining its evolution, security measures, and operational challenges. Analyzes ccTLD operations, hosting risks, and adoption of security features like DNSSEC and CAA records.
Optimizing threat intelligence with MISP: Learn to curate, contextualize, and automate TI feeds for actionable insights, reducing false positives and enhancing SOC, IR, and malware analysis collaboration.
Explore the Cyber Threat Intelligence Analyst role, its competencies, and how it intersects with other cybersecurity disciplines to enhance collaboration and organizational security posture.
Exposé sur les failles de sécurité des dispositifs de stockage portables "sécurisés" avec chiffrement matériel AES, démontrant leur vulnérabilité malgré les promesses des fabricants.
Analysis of INCONTROLLER: a rare and dangerous state-sponsored malware targeting industrial control systems, with focus on its components, attack scenarios, and implications for cybersecurity professionals.
Exploring innovative phishing techniques using code side-loading in signed Office documents, focusing on vulnerabilities in Microsoft-signed add-ins and their potential exploitation for malicious purposes.
Explore load balancer vulnerabilities, architecture, and post-breach tactics. Learn about high-profile exploits, device deployment, and how to navigate these critical network components for both offensive and defensive purposes.
Explore the evolution of cyber threats and defense strategies, focusing on adaptive adversary techniques and the future of cybersecurity. Learn to build more effective defenses against sophisticated attacks.
Explore advanced techniques for bypassing Endpoint Detection and Response systems using Dynamic Invocation in C#, enhancing your understanding of cybersecurity vulnerabilities and defenses.
Critical analysis of supply chain attacks, distinguishing between modification and third-party compromise. Explores functionality, execution, and defensive measures, providing insights for risk assessment and mitigation strategies.
Découvrez la nouvelle stratégie cybersécurité belge visant à protéger le pays, ses entreprises et ses citoyens, ainsi que son alignement avec les initiatives européennes.
Explore CI/CD pipeline vulnerabilities in AWS services, focusing on CodeBuild abuse. Learn how small decisions can compromise security, bypass controls, and potentially lead to pipeline poisoning.
Innovative network-based threat detection technique providing real-time alerting without endpoint software. Leverages internet infrastructure to detect malicious activity across organizational boundaries, augmenting existing EDR solutions.
Explore advanced techniques for building and hiding custom malware, including position independent code and automated payload generation, to evade detection by security products and analysts.
Explore hacktivism's evolution from website attacks to shaping policies and protecting hospitals during crises. Discover the impact of idealistic tech enthusiasts in addressing global challenges.
Get personalized course recommendations, track subjects and courses with reminders, and more.