Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Web Development
Food as Medicine
Introduction to Animal Behaviour
ANIMATIONs
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security BSides. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore the limitations of narrow bug bounty scopes and learn why expanding them can enhance security, as hackers and cybercriminals don't adhere to predefined boundaries.
In-depth analysis of major blockchain security incidents, trends, and opportunities in DeFi, exchanges, and blockchain ecosystems for 2023, offering insights into this evolving field.
Explore vulnerabilities in support systems and live chat services by exploiting placeholders to extract sensitive user data, as demonstrated by Rojan Rijal's research findings.
Explore machine learning techniques for identifying sensitive documents on SharePoint, addressing insider threats and data exfiltration risks while discussing unique challenges in security-focused ML model development.
Explore effective threat modeling techniques for new features and devices, focusing on team education, security communication, and creating understandable models for diverse audiences.
Explore the risks and challenges of empowering business users with Low-Code/No-Code platforms, examining potential security implications and enterprise-wide impacts.
Explore the growing trend of cybersecurity professionals leaving the field, understand the underlying causes, and discover potential solutions to address this critical industry challenge.
Explore FAIR STRIDE, a method for creating application threat models to determine ROI on security controls and prioritize risk reduction efforts for scalable product security.
Discover Overwatch: a serverless security orchestration solution in Go, simplifying CI management and infrastructure maintenance for lean security teams shifting left.
Deep-dive analysis of MS-DOS malware, exploring infection techniques, stealth mechanisms, and persistence methods. Highlights technical complexity and graphical displays in 16-bit DOS malware through reverse-engineering.
Explore vulnerabilities in AI systems and learn about various attacks on machine learning algorithms, their potential impacts, and the importance of AI security awareness.
Strategies for maximizing learning in Capture the Flag competitions, including tips for beginners and insights from an organizer's perspective on tackling new topics effectively.
Explore the transition from social engineering competitions to professional red team engagements, examining the differences in tactics, strategies, and real-world applications.
Explore how to transform security compliance frameworks into code, streamlining processes and reducing burden on engineering teams while maintaining industry standards and customer trust.
Gain valuable insights on interviewing dos and don'ts from an experienced hiring manager's perspective, enhancing your chances of success in the job market.
Get personalized course recommendations, track subjects and courses with reminders, and more.