Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Software Development
Digital Marketing
Advanced Precalculus: Geometry, Trigonometry and Exponentials
Introduction to Animal Behaviour
Astronomy: Exploring Time and Space
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore how library science principles can enhance information security practices, improving data organization, retrieval, and overall cybersecurity effectiveness.
Explore strategies for building sustainable security programs, addressing burnout, risk alignment, and organizational culture to create effective and resilient information security practices.
Explore Proving Ground, a powerful OSINT tool, and learn its methodology, benchmarks, and limitations compared to other tools in this comprehensive overview.
Explore data breach consequences, stakeholders, and regulatory implications across industries. Learn about post-incident processes and interactions with external parties and government agencies.
Explore techniques for backdooring MS Office documents using secret master keys, uncovering potential vulnerabilities and security risks in widely-used productivity software.
Explore security vulnerabilities, consumer protection laws, and IoT's impact on legal frameworks. Gain insights into evolving cybersecurity challenges and their legal implications.
Discover advanced OSINT techniques for social media intelligence gathering, focusing on efficient methods to extract valuable information from online platforms.
Explore operational security techniques for creating temporary online personas, isolating true identities, and conducting OSINT missions with insights from ex-Special Operations cyber operators.
Learn to use MITRE ATT&CK framework for focused threat hunting, avoiding overwhelming approaches. Discover how to build hypotheses, plan hunts, and operationalize findings for more effective cybersecurity practices.
Explore the evolution of hacking and un-hacking a logic game over two decades, culminating in insights about the popular puzzle Lights Out.
Explore the differences between central and local verification of memorized secrets, examining security implications and best practices for password management.
Explore why young people disregard password security advice and learn effective strategies to engage them in cybersecurity best practices.
Explore the unique challenges and experiences of relocating to Point Roberts, an American exclave bordering Canada, in this intriguing talk by Robert "TProphet" Walker.
Discover why shorter passwords can be more secure and effective. Learn innovative approaches to password management and authentication in this thought-provoking talk.
Explore ethical considerations and practical applications of password cracking techniques, examining their use for security, malicious intent, and commercial purposes.
Get personalized course recommendations, track subjects and courses with reminders, and more.