Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Learn essential hardware hacking techniques focusing on Serial and JTAG interfaces. Explore embedded devices, TTL signaling, and tools like OpenOCD for effective device communication and manipulation.
Explore the hidden risks of shadow IT, IoT, and mobile workforce in cybersecurity. Learn strategies for regaining control and mitigating threats in the modern digital landscape.
Explore conflict resolution styles in InfoSec and Risk Management through original research, focusing on improving social skills and effective negotiation techniques for better outcomes.
Explore evolving attacker strategies and game-changing defense techniques in cybersecurity. Learn about manual intervention, deconstruction, and layered approaches to stay ahead of threats.
Explore medical device cybersecurity with experts, covering FDA regulations, premarket reviews, and future developments in this informative talk on patient safety and healthcare technology.
Discover a young hacker's journey, exploring vulnerable platforms, wargames, and online challenges. Learn practical tips and guidelines for aspiring cybersecurity enthusiasts.
Explore YubiKey's versatile 2-factor authentication capabilities, from setup to advanced security features. Learn implementation techniques for various projects and understand potential vulnerabilities.
Explore the legal implications of border searches on electronic devices, focusing on the Fourth Amendment, privacy concerns, and practical tips for protecting personal data during travel.
Explore advanced spectrum monitoring techniques using Software Defined Radio, covering transient events, digital sweeping, and multi-device setups for enhanced signal analysis.
Explore tactical situational awareness, physical tampering protection, and automatic process mitigation with Kobra, a client for Badger 2.0. Learn about security shortcomings and innovative solutions.
Explore software-defined radio signal processing using affordable microcontrollers. Learn hardware architecture, signal processing techniques, and practical applications for digital communications and RF hacking.
Explore wireless networking using audio signals, covering PSK31 encoding, Fourier transforms, and data structures. Learn innovative techniques for airgap communication and content-addressable storage.
Explore innovative data exfiltration techniques using social media platforms, focusing on overcoming limitations and enhancing covert communication methods for cybersecurity professionals.
Explore Python-based post-exploitation techniques for Windows and Mac, covering phishing, host triage, domain enumeration, and persistence methods in this comprehensive cybersecurity presentation.
Explore the evolution of botnet empires, their lifecycle, functions, and detection methods. Learn about famous botnets, takedown attempts, and manual analysis techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.