Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from BruCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore advanced TCP/IP techniques and vulnerabilities with renowned security expert Dan Kaminsky in this thought-provoking keynote address from BruCON 0x03.
Explore challenges and solutions for incident response in cloud environments, focusing on logging options, visibility issues, and automated response techniques for improved security operations.
Atomic Threat Coverage framework: Automatically generate actionable analytics to combat threats based on MITRE ATT&CK model, unifying detection, response, mitigation, and simulation for efficient security operations.
Uncovers critical vulnerabilities in WPA3's Dragonfly handshake, demonstrating password partitioning attacks and discussing practical implications for Wi-Fi security. Explores countermeasures and assesses WPA3's effectiveness as a modern security protoco…
Uncover vulnerabilities in Bluetooth Low Energy 5's PRNG, enabling sniffing and jamming of BLE 5 connections. Learn to exploit weaknesses and use updated tools for IoT security testing.
Explore automated adversary emulation with MITRE Caldera 2.0, focusing on extending its capabilities, improving reporting, and overcoming security controls for enhanced ATT&CK coverage and adoption.
Detecting WMI lateral movement in enterprise networks: overview, challenges, and custom IDS fingerprints for improved security. Practical insights for SOC analysts to enhance threat detection capabilities.
Exploring non-physical human identifiers in digital security: forensic linguistics, behavioral signatures, and cultural references. Implications for tracking threat actors and privacy protection.
Explore the ISO/SAE 21434 standard for automotive cybersecurity, focusing on technical mechanisms to protect modern vehicles from hacking and ensure safe driving experiences.
Explore effective infosec strategies with Rob Fuller as he shares insights from his diverse career, debunking myths and focusing on practical solutions for cybersecurity challenges.
Exploring IoT vulnerabilities using Disney Circle and Foscam devices as case studies, highlighting novel attack techniques and discussing the security implications of IoT in home networks.
Explore real-world container escapes and privilege escalation techniques in popular solutions like Docker and Kubernetes. Learn methodologies for assessing containerized environments and implementing secure configurations.
Exploits in Wetware: Unveiling social engineering tactics, OSINT techniques, and strategies to protect organizations from human-based vulnerabilities in cybersecurity.
Reflective keynote exploring a decade of cybersecurity challenges, assessing progress and persistent issues in the field since BruCon's inception.
Comprehensive defense strategy for Windows environments, leveraging native Microsoft tools to disrupt cyber-attack kill chains. Covers detection, response, and automated remediation across various attack stages.
Get personalized course recommendations, track subjects and courses with reminders, and more.