Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Web Development
Food as Medicine
Introduction to Animal Behaviour
ANIMATIONs
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore advanced x64 code injection techniques, focusing on practical implementation and security implications in modern Windows systems.
Learn strategies to secure DevOps pipelines without compromising speed, focusing on integrating security measures seamlessly into fast-paced development workflows.
Discover untold stories, innovative bypasses, and social engineering techniques from 7 years of physical penetration testing. Gain insights into defeating security measures through real-world examples.
Insights on security management drawn from teenage work experience at Hollywood Video, relating retail theft prevention to modern cybersecurity practices and principles.
Explore the White House's approach to space systems cybersecurity and national strategy, led by the Office of the National Cyber Director, aligning with Biden-Harris Administration's initiatives.
Explore Windows 11's automation feature and its potential security implications. Learn how users can create custom processes that are distributed and executed across machines.
Insider tips from a security recruiter to enhance your InfoSec job search, covering resume optimization, networking strategies, LinkedIn profile improvements, and effective interview techniques.
Insights on scaling security processes at Google, balancing effectiveness with minimal disruption, and maintaining team morale while achieving security goals.
Explore a graph-based approach for efficient vulnerability management in microservices, focusing on identifying and fixing inherited vulnerabilities across large-scale architectures.
Explore recent legal developments affecting web scraping's legality, focusing on the HiQ Labs v. LinkedIn case and its implications for data collection practices.
Discover practical strategies for assembling a supportive peer network to enhance collective success in the cybersecurity field.
Demonstración en vivo de ciberataques a dispositivos IoT, con hallazgos de investigación de seguridad y técnicas de mitigación de amenazas para proteger contra actores maliciosos.
Explore strategies for secure account recovery with 2FA, balancing user convenience and protection against account takeovers while minimizing support overhead.
Explore the infrastructure behind Capture The Flag competitions, including user registration, flag submission, and scoreboard management for event organizers.
Insights on building end-to-end encrypted applications, addressing challenges in security, compliance, abuse prevention, availability, and observability for privacy-focused collaborative products.
Get personalized course recommendations, track subjects and courses with reminders, and more.