Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore ethical challenges of in-home robots, including privacy, security, and social implications. Discusses robot personalities, authority, and potential misuse in various scenarios.
Explore password hashing policies, their disclosure, and implications for security. Learn about password length, breaches, and rating systems for evaluating hashing practices across various platforms.
Explore innovative passphrase generation techniques focusing on cultural relevance, vocabulary assessment, and user-friendly approaches to enhance password security and memorability.
Explore Windows Subsystem for Linux: architecture, processes, system calls, and security implications. Learn about cross-process access and Linux-Windows interactions.
Automate Active Directory privilege escalation analysis using Bloodhound. Learn techniques for identifying and exploiting paths to Domain Admin access efficiently.
Learn effective strategies for baselining security logs and event data to identify anomalies, establish normal patterns, and enhance threat detection capabilities in your organization.
Explore innovative network security strategies, focusing on egress filtering to combat phishing, botnets, and ransomware. Learn practical implementation and potential drawbacks.
Learn advanced PowerShell techniques for endpoint threat hunting, including methodologies, tools, and analysis modules for detecting and investigating malware and suspicious activities.
Learn effective techniques for identifying and targeting high-value assets within corporate networks, focusing on practical strategies, network complexity, and data discovery methods.
Explore machine learning disasters, their consequences, and potential solutions in this thought-provoking keynote addressing ethical challenges and the need for responsible AI development.
Learn to build and implement data diodes for secure industrial control systems, covering hardware, software, workflows, and threat modeling.
Explore the complexities of password security, alternative authentication methods, and user-centric approaches to digital identity protection in this insightful cybersecurity talk.
Humorous exploration of security failures and cynicism in the tech industry, highlighting common pitfalls and the challenges of creating truly secure systems.
Explore innovative security solutions for distributed workforces, addressing challenges in user protection, monitoring, and maintaining a secure environment in cloud-based and remote work settings.
Explore the intricacies of reverse engineering a 1994 DOS PC FMV game, uncovering techniques and challenges in dissecting vintage software architecture.
Get personalized course recommendations, track subjects and courses with reminders, and more.