Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from BruCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explores DNS as critical infrastructure, examining its evolution, security measures, and operational challenges. Analyzes ccTLD operations, hosting risks, and adoption of security features like DNSSEC and CAA records.
Explore the realities of cyberdefense, including incident management, communication challenges, and maintaining work-life balance in this insightful talk by a seasoned professional.
Explore techniques to bypass Microsoft Defender for Identity, executing high-impact attacks across the kill chain while avoiding detection in on-premises Active Directory environments.
Exploración de seguridad del terminal Starlink: vulnerabilidades, ataques de inyección de fallas y acceso root. Análisis de la red Starlink y sus implicaciones para futuras investigaciones.
Explore Android malware's evolution, focusing on banking trojans targeting Belgian apps. Learn about various malware types, their mechanisms, and strategies for protection.
Exploring techniques to identify and analyze operational technology malware, focusing on unique challenges and methods for filtering OT binaries without advanced reverse engineering skills.
Explore eCos RTOS security, from firmware analysis to exploitation and persistence. Learn techniques for cable modem research, including memory corruption, shellcode development, and implant creation.
Explore automated binary analysis using Ghidra's P-Code, an intermediate language that enables architecture-independent scripting for reverse engineering and vulnerability research.
Professional thieves share insider techniques for bypassing physical security, including sneaking in, fake badges, and social engineering, along with entertaining stories from real-world engagements.
Análisis de seguridad a escala de Internet de configuraciones de AWS Cognito, revelando vulnerabilidades comunes y acceso no autorizado a recursos de AWS. Incluye demostraciones, metodologÃa y recomendaciones para desarrolladores.
Strategies for building diverse security teams, addressing hiring challenges, and fostering talent through mentorship and professional development in the rapidly evolving cybersecurity landscape.
Exposición de vulnerabilidades en protocolos 5G/4G, afectando operadores y dispositivos. Demostraciones de ataques de secuestro, degradación y agotamiento de baterÃa. Discusión de soluciones y interacciones con proveedores.
Explore cloud SIEM's impact on cybersecurity, from real-time threat detection to AI-driven responses. Learn how this technology reshapes security teams, risk management, and the future of threat hunting.
Innovative techniques for advanced red team operations, including infrastructure management, blue team detection, and dynamic adjustments to enhance effectiveness and evasion.
Explore vulnerabilities in PLCs, focusing on discovery methods and how combining minor flaws can lead to device takeover. Learn about SNMP exploitation, memory manipulation, and firmware modification.
Get personalized course recommendations, track subjects and courses with reminders, and more.